-
3961
Zynq FPGA-Based Acceleration of Kernelized Correlation Filters via High-Level Synthesis of a Custom DFT Block
Published 2024-04-01“…Within this framework, a custom combined DFT and inverse DFT IP, named CDFT, is developed and optimized on the Programmable Logic (PL) side of the Xilinx ZCU102 FPGA, whereas the rest of the KCF algorithm is run with customized Petalinux build on the (Processing System) side. …”
Get full text
Article -
3962
Predictive model for determining the indications for automated 3D ultrasound for screening patients at low risk of developing breast tumors
Published 2024-06-01“…The developed algorithms will help optimize screening and referral for additional examinations, which is of practical importance for improving diagnostics and optimizing healthcare resources.…”
Get full text
Article -
3963
FUR-DETR: A Lightweight Detection Model for Fixed-Wing UAV Recovery
Published 2025-05-01“…Finally, a wavelet frequency–domain-optimized reverse feature fusion mechanism (WT-FORM) is proposed. …”
Get full text
Article -
3964
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
3965
Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography
Published 2013-01-01“…Our numerical simulations indicate that the proposed algorithm can manage well with noisy measurements, allowing a dose reduction by a factor of 4, while reducing noise and streak artifacts in the FBP reconstruction, comparable to the performance of a statistically based iterative algorithm.…”
Get full text
Article -
3966
WSNs data acquisition by combining expected network coverage and clustered compressed sensing.
Published 2025-01-01“…Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. …”
Get full text
Article -
3967
Mortality prediction of heart transplantation using machine learning models: a systematic review and meta-analysis
Published 2025-04-01“…Among the algorithms, CatBoost demonstrated the highest accuracy (AUC 0.80, 95% CI: 0.74, 0.86), while K-nearest neighbor had the lowest accuracy (AUC 0.53, 95% CI: 0.50, 0.55). …”
Get full text
Article -
3968
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01“…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. …”
Get full text
Article -
3969
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…The method mainly consists of two parts: wireless channel parameter estimation and optimal relay position search. Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
Get full text
Article -
3970
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01“…Throughout the years, the voting process has under-gone a digital transformation, aiming to achieve greater control and optimize time while ensuring the integrity of each vote. …”
Get full text
Article -
3971
Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering
Published 2024-06-01“…Moreover, the transmit power of DUE was optimized to maximize the system sum rate while ensured that DUE did not cause serious interference to CUE. …”
Get full text
Article -
3972
Robust sparse smooth principal component analysis for face reconstruction and recognition.
Published 2025-01-01“…Within the Minorization-Maximization (MM) framework, an iterative process is designed to solve the RSSPCA optimization problem, ensuring that a locally optimal solution is achieved. …”
Get full text
Article -
3973
Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event
Published 2025-04-01“…Our goal is to minimize system energy consumption while satisfying system performance. We formulate the problem as a long-term stochastic optimization problem. …”
Get full text
Article -
3974
Accelerated Tensor Robust Principal Component Analysis via Factorized Tensor Norm Minimization
Published 2025-07-01“…Experimental results demonstrate that our algorithm achieves significantly faster performance than existing reference methods known for efficient computation while maintaining high accuracy in recovering low-rank tensors for applications such as color image recovery and background subtraction.…”
Get full text
Article -
3975
A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index
Published 2025-02-01“…This paper proposes a multi-ship collision avoidance algorithm that integrates the quaternion ship domain (QSD) and collision risk index (CRI) to assess collision risk and generate optimal avoidance trajectories. …”
Get full text
Article -
3976
Research on filter-based adversarial feature selection against evasion attacks
Published 2023-07-01“…With the rapid development and widespread application of machine learning technology, its security has attracted increasing attention, leading to a growing interest in adversarial machine learning.In adversarial scenarios, machine learning techniques are threatened by attacks that manipulate a small number of samples to induce misclassification, resulting in serious consequences in various domains such as spam detection, traffic signal recognition, and network intrusion detection.An evaluation criterion for filter-based adversarial feature selection was proposed, based on the minimum redundancy and maximum relevance (mRMR) method, while considering security metrics against evasion attacks.Additionally, a robust adversarial feature selection algorithm was introduced, named SDPOSS, which was based on the decomposition-based Pareto optimization for subset selection (DPOSS) algorithm.SDPOSS didn’t depend on subsequent models and effectively handles large-scale high-dimensional feature spaces.Experimental results demonstrate that as the number of decompositions increases, the runtime of SDPOSS decreases linearly, while achieving excellent classification performance.Moreover, SDPOSS exhibits strong robustness against evasion attacks, providing new insights for adversarial machine learning.…”
Get full text
Article -
3977
Three-Dimensional Extended Target Tracking and Shape Learning Based on Double Fourier Series and Expectation Maximization
Published 2025-07-01“…Specifically, the 3D shape is modeled using a radial function estimated via double Fourier series (DFS) expansion, and orientation is represented using the compact, singularity-free axis-angle method. The ECM algorithm facilitates this joint estimation: an Unscented Kalman Smoother infers kinematics in the E-step, while the M-step estimates DFS shape parameters and rotation angles by minimizing regularized cost functions, promoting robustness and smoothness. …”
Get full text
Article -
3978
Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations
Published 2023-01-01“…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
Get full text
Article -
3979
Photovoltaic Farm Power Generation Forecast Using Photovoltaic Battery Model with Machine Learning Capabilities
Published 2025-06-01“…The model further uses ANFIS outputs to estimate PV generation and optimize battery state of charge (SoC), achieving a consistent minimal SoC reduction of about 0.88% (from 80% to 79.12%) over four different battery types over a seven-day charge–discharge cycle, providing up to 11 h of battery autonomy under specified load conditions. …”
Get full text
Article -
3980
Variable-Rate Nitrogen Application in Wheat Based on UAV-Derived Fertilizer Maps and Precision Agriculture Technologies
Published 2025-07-01“…Variable-rate nitrogen (VR-N) application allows farmers to optimize nitrogen (N) input site-specifically within field boundaries, enhancing both economic efficiency and environmental sustainability. …”
Get full text
Article