-
4201
A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P
Published 2025-01-01“…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
Get full text
Article -
4202
Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET
Published 2025-03-01“…Data aggregation is secured through a Two-Step Secure (STS) method and Elliptic Curve Cryptography (ECC), while optimal routing is achieved using the Improved Elephant Herd Optimization (IEHO) algorithm. …”
Get full text
Article -
4203
Hybrid energy storage systems for photovoltaic storage microgrids power allocation and capacity determination based on adaptive Savitzky-Golay filtering and VMD-DTW
Published 2025-09-01“…An enhanced dung beetle optimization algorithm is employed to optimize this model, enabling adaptive parameter adjustments in SG filtering. …”
Get full text
Article -
4204
Fairness-Aware Computation Offloading for Mobile Edge Computing With Energy Harvesting
Published 2025-01-01“…This research formulates the Fairness-aware Computation Offloading Optimization (FACOO) algorithm. The Lyapunov approach and sequential least squares quadratic programming (SLSQP) are used to ascertain the best offloading ratio, transmission power, and CPU frequency while complying with signal-to-interference-plus-noise ratio (SINR) limitations. …”
Get full text
Article -
4205
Masks-to-Skeleton: Multi-View Mask-Based Tree Skeleton Extraction with 3D Gaussian Splatting
Published 2025-07-01“…Furthermore, we use a minimum spanning tree (MST) algorithm during the optimization loop to regularize the graph to a tree structure. …”
Get full text
Article -
4206
Accuracy-Aware MLLM Task Offloading and Resource Allocation in UAV-Assisted Satellite Edge Computing
Published 2025-07-01“…We formulate the joint optimization of MLLM task offloading and resource allocation as a mixed-integer nonlinear programming (MINLP) problem, minimizing latency and energy consumption while optimizing offloading decisions, power allocation, and UAV trajectories. …”
Get full text
Article -
4207
Path Planning for Lunar Rovers in Dynamic Environments: An Autonomous Navigation Framework Enhanced by Digital Twin-Based A*-D3QN
Published 2025-06-01“…This paper proposes a digital twin-enhanced hierarchical planning method, A*-D3QN-Opt (A-Star-Dueling Double Deep Q-Network-Optimized). The framework combines the A* algorithm for global optimal paths in static environments with an improved D3QN (Dueling Double Deep Q-Network) for dynamic obstacle avoidance. …”
Get full text
Article -
4208
A critical evaluation of Pure Pursuit, MPC and MPCC: Balancing simplicity, performance and constraints
Published 2024-01-01“…The computational demands of optimization-based algorithms result in a computation delay where the algorithm calculates for the vehicle's position one iteration behind its actual movement. …”
Get full text
Article -
4209
Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction
Published 2025-07-01“…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
Get full text
Article -
4210
Enhancing Vertical Trajectory Reconstruction in SASS-C: Advanced Segmentation, Outlier Detection, and Filtering Techniques
Published 2024-10-01“…The invalid detection algorithm, while incurring a slight computational cost, significantly enhances trajectory accuracy. …”
Get full text
Article -
4211
Recommendations on Chronic Constipation (Including Constipation Associated with Irritable Bowel Syndrome) Treatment
Published 2007-01-01“…The myriad of treatment options available to Canadian physicians can be confusing; thus, the main aim of the recommendations and treatment algorithm is to optimize the approach in clinical care based on available evidence.…”
Get full text
Article -
4212
Toward a unified gait freeze index: a standardized benchmark for clinical and regulatory evaluations
Published 2025-05-01“…Our algorithm is made available as open-source Python code, promoting accessibility and reproducibility.…”
Get full text
Article -
4213
An Effective Hybrid Strategy: Multi-Fuzzy Genetic Tracking Controller for an Autonomous Delivery Van
Published 2025-06-01“…Their output signals are optimally weighted by a genetic algorithm to determine the proper allocation of control signals for calculating the final steering angle. …”
Get full text
Article -
4214
Hybrid Recurrent Neural Network and Decision Tree Scheduling for Energy-Efficient Resource Allocation in Cloud Computing
Published 2025-01-01“…The RNN model uses historical execution data to accurately predict task execution time, while the DT model classifies VMs based on performance characteristics, ensuring optimal task-to- VM assignments. …”
Get full text
Article -
4215
An integrated model of threshold-based scaling and fractional admission controlling to improve resource utilization efficiency in 5G core networks.
Published 2025-01-01“…One requirement is utilizing system resources effectively while ensuring stable system performance. Specifically, the need to optimize unused UPF instances to reduce system costs. …”
Get full text
Article -
4216
Computational Construction of Sequential Efficient Designs for the Second-Order Model
Published 2025-04-01“…By relaxing the restriction of non-replicated points within equally spaced intervals, our approach maintains space-filling properties while allowing greater flexibility for model-specific optimization. …”
Get full text
Article -
4217
Network security situation assessment based on dual attention mechanism and HHO-ResNeXt
Published 2023-12-01“…To solve these problems, this paper combines ResNeXt with the Efficient Channel Attention (ECA) module and the Contextual Transformer (COT) block to construct a model to assess network conditions. The optimal hyperparameters of the model are selected by the Harris Hawks Optimization (HHO) algorithm. …”
Get full text
Article -
4218
An efficient hybrid framework with knowledge transfer for solving capacitated vehicle routing problems
Published 2025-06-01“…This study proposes a hybrid framework (HF) that addresses these limitations through four key components: (1) An improved Clarke–Wright savings algorithm for rapid initialization of high-quality solutions, (2) an incremental auxiliary task formulation that optimizes knowledge transfer while minimizing computational overhead, (3) a similarity prediction strategy enabling efficient offspring selection without additional evaluations, and (4) the framework integrates enhanced search strategy and diversity maintenance strategy to prevent premature convergence. …”
Get full text
Article -
4219
Decannulation ahead: a comprehensive diagnostic and therapeutic framework for tracheotomized neurological patients
Published 2025-03-01“…This framework promotes flexibility, enabling clinicians to tailor interventions to individual patient needs while maintaining safety and optimizing outcomes.…”
Get full text
Article -
4220
Sequential Inversion for Helicopter Time-Domain Electromagnetics Based on a Regularized Extended Kalman Filtering
Published 2025-01-01“…Based on the sequential processing strategy of measuring while inverting, the REKF algorithm yields the optimal solution of the inversion objective function in just a few iterations, or even a single iteration, enabling near real-time calculations. …”
Get full text
Article