-
881
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
882
Reinforcement Learning for Computational Guidance of Launch Vehicle Upper Stage
Published 2022-01-01“…This manuscript investigates the use of a reinforcement learning method for the guidance of launch vehicles and a computational guidance algorithm based on a deep neural network (DNN). Computational guidance algorithms can deal with emergencies during flight and improve the success rate of missions, and most of the current computational guidance algorithms are based on optimal control, whose calculation efficiency cannot be guaranteed. …”
Get full text
Article -
883
Optimum Design Research on the Link Mechanism of the JP72 Lifting Jet Fire Truck Boom System
Published 2024-12-01“…The fmincon function was used to realize the sequential quadratic programming (SQP) algorithm, which is one of the most effective methods to solve the constrained nonlinear optimization problems, for the optimal design. …”
Get full text
Article -
884
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
885
Spatio‐temporal dynamic navigation for electric vehicle charging using deep reinforcement learning
Published 2024-12-01“…A recently proposed on‐policy actor–critic method, phasic policy gradient (PPG) which extends the proximal policy optimization algorithm with an auxiliary optimization phase to improve training by distilling features from the critic to the actor network, is used to make EVCS decisions on the network where EV travels through the optimal path from origin node to EVCS by considering dynamic traffic conditions, unit value of EV owner and time‐of‐use charging price. …”
Get full text
Article -
886
Performance evaluation of an adopted model based on big-bang big-crunch and artificial neural network for cloud applications
Published 2021-08-01“…The proposed model is inspired from Big-Bang Big-Crunch algorithm in astrology. The work has been compared with a genetic algorithm, Particle swarm optimization and TOPSIS algorithm. …”
Get full text
Article -
887
Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding
Published 2014-01-01“…The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. …”
Get full text
Article -
888
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
Get full text
Article -
889
Green Energy Strategic Management for Service of Quality Composition in the Internet of Things Environment
Published 2020-01-01“…The simulation results reveal that MFO has good optimization effect in the abovementioned models, and the optimization effect of MFO is improved by 8% and 6% compared with the genetic algorithm and particle swarm optimization, so as to realize the green energy strategic management of QoS composition in the environment of IoT.…”
Get full text
Article -
890
Bearing Fault Diagnosis in the Mixed Domain Based on Crossover-Mutation Chaotic Particle Swarm
Published 2021-01-01“…Finally, the support vector machine is optimized using the improved chaotic particle swarm to improve fault classification diagnosis. …”
Get full text
Article -
891
A Novel Smart Molecular Fuzzy Decision Support System for Solid-State Battery Investments in Grid-Level Renewable Energy Storage
Published 2025-01-01“…It is very necessary to determine the most critical indicators to improve the performance of solid-state battery investments. …”
Get full text
Article -
892
ACO-Based Neural Network to Enhance the Efficiency of Network Controllability of Temporal Networks
Published 2025-01-01“…In the proposed method, a population method based on the ant colony optimization (ACO) algorithm is proposed, which is compatible with temporal networks. …”
Get full text
Article -
893
An integrated approach of feature selection and machine learning for early detection of breast cancer
Published 2025-04-01“…Feature selection using recommended algorithm and optimization of the LightGBM model through PSO can significantly enhance the accuracy of breast cancer prediction. …”
Get full text
Article -
894
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
Get full text
Article -
895
Hybrid chaotic firefly decision making model for Parkinson’s disease diagnosis
Published 2020-01-01“…The dynamics of chaos optimization algorithm will enhance the firefly algorithm by introducing six types of chaotic maps which will increase the diversification and intensification capability of chaos-based firefly algorithm. …”
Get full text
Article -
896
A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing
Published 2013-01-01“…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
Get full text
Article -
897
Subspace-based local compilation of variational quantum circuits for large-scale quantum many-body simulation
Published 2025-06-01“…Simulation of quantum many-body systems is one of the most promising applications of quantum computers. …”
Get full text
Article -
898
Design and Implementation of Hybrid GA-PSO-Based Harmonic Mitigation Technique for Modified Packed U-Cell Inverters
Published 2024-12-01“…This paper proposes a hybrid version of the GA-PSO algorithm that exploits the exploratory strengths of GA and the convergence efficiencies of PSO in determining the optimized switching angles for SHM techniques applied to modified five-level and seven-level PUC inverters. …”
Get full text
Article -
899
A multi-dimensional data-driven ship roll prediction model based on VMD-PCA and IDBO-TCN-BiGRU-Attention
Published 2025-06-01“…Finally,the improved dung beetle optimization (IDBO) algorithm is used to optimize the hyper-parameters of the model. …”
Get full text
Article -
900
Degradation and reliability assessment of accuracy life of RV reducers
Published 2025-01-01“…A Gaussian process regression model optimized by genetic algorithm was established using vibration characteristic data to optimize the prediction of transmission accuracy.ResultsThe results show that the prediction accuracy based on Gaussian process regression model is significantly better than that of traditional regression model. …”
Get full text
Article