-
4321
HGCS—A Multiplex Transmission Method for Wide-Area Unmanned Aerial Vehicle Cluster Inspection Data in Hybrid Networked Transmission Lines
Published 2024-01-01“…To address these challenges, an effective optimization algorithm is required to balance the algorithmic performance while considering the fairness and QoS parameters. …”
Get full text
Article -
4322
Research on pedestrian detection technology for mining unmanned vehicles
Published 2024-10-01“…YOLOv3 and a coal mine key position personnel unsafe behavior recognition method based on improved YOLOv7 and ByteTrack experienced missed detections and false positives based on enhanced images, while the proposed pedestrian detection algorithm effectively mitigated these issues.…”
Get full text
Article -
4323
Multi-user joint task offloading and resource allocation based on mobile edge computing in mining scenarios
Published 2025-05-01“…In the upper layer, an improved genetic algorithm (IGA) based on heuristic rules is employed to generate an offloading decision population, while the lower layer utilizes the deep deterministic policy gradient (DDPG) algorithm to optimize the offloading strategy and the weighted coefficients for latency and energy consumption. …”
Get full text
Article -
4324
Improved Cylinder-Based Tree Trunk Detection in LiDAR Point Clouds for Forestry Applications
Published 2025-01-01“…While cylinder fitting algorithms provide a three-dimensional (3D) solution for trunk detection, their performance in complex forest environments remains limited due to sensitivity to parameters like distance thresholds. …”
Get full text
Article -
4325
Particle Swarm Optimization with Various Inertia Weight Variants for Optimal Power Flow Solution
Published 2010-01-01“…The PSO algorithm is simulated for each of the method individually. …”
Get full text
Article -
4326
Research and Implementation of Turbo Coding Technology in High-Speed Underwater Acoustic OFDM Communication
Published 2022-01-01“…It is demonstrated that the fully parallel turbo decoding algorithm can achieve an approximate error correction decoding performance when 36 iterations are used and when the log-map algorithm with 6 iterations is used. …”
Get full text
Article -
4327
Engineering project management technology based on visual simulation module and particle swarm optimization
Published 2025-07-01“…Compared with the efficiency value of the algorithm in the first 10s, the traditional single objective optimization algorithm was 0.28, while the proposed algorithm was 0.40. …”
Get full text
Article -
4328
Machine Learning–Driven Adaptive Testing: An Application for the MMPI Assessment
Published 2025-01-01“…The findings indicate that a machine learning classifier based on a model tree (ML-MT) algorithm effectively handled the complex MMPI-2 scales, yielding accurate scores while noticeably reducing item administration. …”
Get full text
Article -
4329
Channel-Hopping Using Reinforcement Learning for Rendezvous in Asymmetric Cognitive Radio Networks
Published 2024-12-01“…This paper addresses the rendezvous problem in asymmetric cognitive radio networks (CRNs) by proposing a novel reinforcement learning (RL)-based channel-hopping algorithm. Traditional methods like the jump-stay (JS) algorithm, while effective, often struggle with high time-to-rendezvous (TTR) in asymmetric scenarios where secondary users (SUs) have varying channel availability. …”
Get full text
Article -
4330
Structure-aware sample consensus for robust stereo visual odometry
Published 2017-10-01“…With this novel procedure, the structure-aware sample consensus gains more possibility to generate a correct motion model and performs as a robust estimator for the underground visual odometry algorithm. The experiments with both synthetic and real-world data show that structure-aware sample consensus outperforms the random sample consensus and its variants in robustness, while maintaining a lower computational cost. …”
Get full text
Article -
4331
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation
Published 2024-06-01“…This research introduces an improved algorithm for concealing messages within color images. …”
Get full text
Article -
4332
A Fast and Efficient Adaptive Threshold Rate Control Scheme for Remote Sensing Images
Published 2012-01-01“…The simulation results show that the computational cost and working buffer memory size of the proposed algorithm reach only 18.13 and 7.81%, respectively, of the same parameters in the postcompression rate distortion algorithm, while the peak signal-to-noise ratio across the images remains almost the same. …”
Get full text
Article -
4333
Optimal Design of Low Sidelobe Sparse Linear Arrays
Published 2024-01-01“…The initial value of the algorithm is generated through the chaotic Piecewise map, while the scaling factor is adjusted dynamically in line with the iterations and fitness values. …”
Get full text
Article -
4334
A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals
Published 2012-01-01“…We first propose a model to collect and analyze user behaviors and then present a polynomial time algorithm for the virus detection. Next, we evaluate this algorithm by testing it with two commercial malwares and one malware written by ourselves and show that our algorithm enjoys a high virus detection rate. …”
Get full text
Article -
4335
The Differential Transform Method as an Effective Tool to Solve Implicit Hessenberg Index-3 Differential-Algebraic Equations
Published 2023-01-01“…This algorithm is easy to implement in Maple or Mathematica. …”
Get full text
Article -
4336
Data aggregation scheme based on SDN for internet of things
Published 2019-02-01“…There are many redundant parts in the data generated and transmitted by IoT devices.Transmitting this data reduces network lifetime and bandwidth.Aiming at the problem,the aggregation gateway layer was proposed,and a SDN-based IoT data aggregation architecture and algorithm were designed.The simulation analysis shows that compared with the architecture of the ordinary gateway and OF-GW,the network lifetime is improved by about 32.6%,and the amount of data packets sent by the sensing layer to the network layer is reduced by 6.1% to 55.1%.Compared with the LEACH algorithm,the designed rule algorithm reduces the average delay of data aggregation by about 24.1%,while avoiding data loss and improving the accuracy of data aggregation.…”
Get full text
Article -
4337
Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver
Published 2019-01-01“…Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.…”
Get full text
Article -
4338
Quantum natural stochastic pairwise coordinate descent
Published 2025-07-01“…We develop a quantum optimization algorithm that leverages the geometry of the state space via this estimator while avoiding full-state tomography, as in conventional techniques. …”
Get full text
Article -
4339
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
4340
Hybrid clustering strategies for effective oversampling and undersampling in multiclass classification
Published 2025-01-01“…By clustering and separating classes into majority and minority categories, this algorithm retains the most information during undersampling while generating efficient data in the minority class. …”
Get full text
Article