-
4941
Leveraging Interactive Evolutionary Computation to Induce Serendipity in Informal Learning
Published 2024-11-01“…Our proposed system leverages an Interactive Genetic Algorithm in conjunction with Knowledge Graphs to dynamically recommend learning content, with a focus on the history of scientific discoveries. …”
Get full text
Article -
4942
Maritime Port Freight Flow Optimization with Underground Container Logistics Systems Under Demand Uncertainty
Published 2025-06-01“…The model is solved using a hybrid algorithm combining an improved Genetic Algorithm and Simulated Annealing (GA-SA) with Deep Q-Learning (DQN). …”
Get full text
Article -
4943
Decentralized Multi-Robot Navigation Based on Deep Reinforcement Learning and Trajectory Optimization
Published 2025-06-01“…Existing decentralized obstacle avoidance strategies, while low in computational cost, often fail to ensure safety effectively. …”
Get full text
Article -
4944
Optimization of ore production scheduling strategy using NSGA-II-GRA in open-pit mining
Published 2025-03-01“…Abstract To address the challenges posed by ore grade fluctuations, extraction cost variations, and market price instability in open-pit ore production strategies, an optimization model integrating a solution algorithm integrating dynamic simulation is proposed. …”
Get full text
Article -
4945
Digital-twin driven alignment control method for marine shafting with air spring vibration isolation system
Published 2025-01-01“…Air spring vibration isolation systems (ASVISs) for marine shafting can help control the shafting alignment state by actively adjusting air spring pressures while effectively reducing the mechanical noise. …”
Get full text
Article -
4946
Joint Beamforming, Scheduling, Trajectory, and Transmit Power Optimization in UAV-Assisted ISAC Systems for Information Freshness
Published 2024-01-01“…Simulation results show that our proposed algorithm can achieve a smaller average AoI with a low complexity compared to benchmark schemes.…”
Get full text
Article -
4947
Finding a suitable chest x-ray image size for the process of Machine learning to build a model for predicting Pneumonia
Published 2025-02-01“…The neural network algorithm achieved an accuracy rate of 87.00% across different image sizes. …”
Get full text
Article -
4948
Architecture and Routing Protocols for Smart Wireless Home Sensor Networks
Published 2013-01-01“…In addition, we improve existing routing algorithms such as SPIN, LEACH, and DD to incorporate traditional WSN routing algorithms into our smart WHSN architecture, and comparable efficiencies are made between them. …”
Get full text
Article -
4949
A robust low‐rank tensor completion model with sparse noise for higher‐order data recovery
Published 2024-10-01“…Some ignore the simultaneous effects of noise and missing values, while most can't handle higher‐order tensors, which are not reflective of real‐world scenarios. …”
Get full text
Article -
4950
SV-SAE: Layer-Wise Pruning for Autoencoder Based on Link Contributions
Published 2025-01-01“…This paper introduces a layer-wise pruning algorithm specifically for multilayer perceptron-based autoencoders. …”
Get full text
Article -
4951
Adaptive Anomaly Detection in Network Flows With Low-Rank Tensor Decompositions and Deep Unrolling
Published 2025-01-01“…We apply deep unrolling to derive a novel deep network architecture based on our proposed algorithm, treating the regularization parameters as learnable weights. …”
Get full text
Article -
4952
Cost-Efficient Distributed Learning via Combinatorial Multi-Armed Bandits
Published 2025-05-01“…By assigning tasks to all workers and waiting only for the <i>k</i> fastest ones, the main node can trade off the algorithm’s error with its runtime by gradually increasing <i>k</i> as the algorithm evolves. …”
Get full text
Article -
4953
User Cost Minimization and Load Balancing for Multiple Electric Vehicle Charging Stations Based on Deep Reinforcement Learning
Published 2025-03-01“…In the second stage, we use the DRL algorithm. In the DRL algorithm, we design a novel reward function that enables charging stations to meet user charging demands while minimizing user charging costs and reducing the load gap among distribution networks. …”
Get full text
Article -
4954
Optimizing drone-based pollination method by using efficient target detection and path planning for complex durian orchards
Published 2025-07-01“…Specifically, we enhance the YOLO-v8 algorithm using the GhostNet lightweight network to reduce computational complexity while boosting detection precision. …”
Get full text
Article -
4955
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
4956
A detail-preserving method for medial mesh computation in triangular meshes
Published 2024-12-01“…Experiments on various types of 3D models demonstrate the robustness, shape fidelity, and efficiency in representation achieved by our algorithm.…”
Get full text
Article -
4957
YOLO-APDM: Improved YOLOv8 for Road Target Detection in Infrared Images
Published 2024-11-01“…A new algorithm called YOLO-APDM is proposed to address low quality and multi-scale target detection issues in infrared road scenes. …”
Get full text
Article -
4958
STAKEHOLDER-INTEGRATED APPROACH TO ASSESSMENT OF LEVEL IN URBAN ENGINEERING AND INFRASTRUCTURE PROVISION
Published 2018-04-01“…An algorithm for assessment of level in engineering and infrastructure support of urban area has been developed while using geographic information systems (GIS) in the framework of stakeholder-integrated approach. …”
Get full text
Article -
4959
Hybrid precoding based on distributed partially-connected structure for multiuser massive MIMO
Published 2022-01-01“…For multiuser massive multiple-input multiple-output (MIMO) systems, to solve the problem of underutilized spatial resources caused by centralized partially-connected structure (PCS) and fixed-matching phase-control algorithm in conventional schemes, a low complexity phased zero-forcing (PZF) hybrid precoding scheme based on distributed PCS was proposed.The logical antenna subarrays with more than the number of radio frequency (RF) chains were designed, so that each RF chain could be connected to multiple distributed subarrays to provide higher spatial diversity gain.Further, by analyzing the influence of phase-control analog precoding on zero-forcing digital precoding, a phase-control analog precoding algorithm via successively maximizing users’ total subarray gains was proposed to maximize the upper bound of system spectral efficiency.Analysis and simulation results show that, compared with the conventional schemes, the proposed scheme can significantly improve the system spectral efficiency while slightly increases the computational complexity, and it is also insensitive to imperfect channel state information.…”
Get full text
Article -
4960
APPLICATION OF IMPROVED EXPERIENCE WAVELET TRANSFORM IN FAULT DIAGNOSIS OF WIND TURBINE GEARBOX
Published 2022-01-01“…The results show that the CASNEWT method retains the advantages of the EWT algorithm, which can effectively avoid the modal aliasing effect and the end effect, while greatly improving the robustness of the EWT decomposition algorithm to noise, removes the noise and retains the original signal characteristic information. …”
Get full text
Article