-
4641
Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT
Published 2025-08-01“…In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource consumption) while satisfying reliability, latency, and throughput requirements. …”
Get full text
Article -
4642
A Model‐Independent Strategy for the Targeted Observation Analysis and Its Application in ENSO Prediction
Published 2025-07-01“…Sensitive experiments show that while number of data sets reaches 12, a robust optimal observational array is obtained. …”
Get full text
Article -
4643
Deep reinforcement learning applications and prospects in industrial scenarios
Published 2025-04-01“…Central to these systems are control algorithms, which enable the automation of operations, optimization of process parameters, and reduction of operational costs. …”
Get full text
Article -
4644
A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P
Published 2025-01-01“…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
Get full text
Article -
4645
Adaptive Switching Redundant-Mode Multi-Core System for Photovoltaic Power Generation
Published 2024-11-01“…Additionally, by analyzing the relationship between performance and reliability, we proposed optimization methods to improve reliability while ensuring a high performance was maintained. …”
Get full text
Article -
4646
Novel channel attention-based filter pruning methods for low-complexity semantic segmentation models
Published 2025-09-01“…Examples of widely used semantic segmentation models are the U-Net and DeeplabV3+ models. While the aforementioned models have been deemed very successful in segmenting medical targets including organs and diseases in high resolution images, the computational complexity represents a burden for the real-time application of the algorithms or the deployment of the models on resource-constrained platforms. …”
Get full text
Article -
4647
Towards a smart debt collection system: a Design Science Research approach
Published 2025-07-01“…Abstract While manual, expert-based approaches to debt collection have long dominated the industry, the growing complexity and volume of data—resulting in information overload—highlight the need for machine-learning solutions. …”
Get full text
Article -
4648
Evaluation of a Polarimetric Contrast Enhancement Technique as Preprocessing Step for Vessel Detection in SAR Images: Comparison of Frequency Bands and Polarimetric Modes
Published 2025-03-01“…A potential solution to this issue is to develop methodologies that suppress backscattered signals from the sea while preserving the radar returns from ships. In this work, we analyse a contrast enhancement method which is designed to suppress unwanted sea clutter while preserving signals from potential ships. …”
Get full text
Article -
4649
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
4650
Path Planning for Lunar Rovers in Dynamic Environments: An Autonomous Navigation Framework Enhanced by Digital Twin-Based A*-D3QN
Published 2025-06-01“…This paper proposes a digital twin-enhanced hierarchical planning method, A*-D3QN-Opt (A-Star-Dueling Double Deep Q-Network-Optimized). The framework combines the A* algorithm for global optimal paths in static environments with an improved D3QN (Dueling Double Deep Q-Network) for dynamic obstacle avoidance. …”
Get full text
Article -
4651
Digital mapping of peat thickness and extent in Finland using remote sensing and machine learning
Published 2025-03-01“…In this study, we present a workflow for producing peat occurrence maps for the whole of Finland. For this, we used random forest classification to map areas with peat thicknesses of ≥ 10 cm, ≥30 cm, ≥40 cm, and > 60 cm. …”
Get full text
Article -
4652
YOLOv8-Based Estimation of Estrus in Sows Through Reproductive Organ Swelling Analysis Using a Single Camera
Published 2024-10-01“…Accurate and efficient estrus detection in sows is crucial in modern agricultural practices to ensure optimal reproductive health and successful breeding outcomes. …”
Get full text
Article -
4653
Cross-sectional imaging of speed-of-sound distribution using photoacoustic reversal beacons
Published 2025-02-01“…By picking up the PRB signal using a graph-based dynamic programing algorithm, we formulate a linear inverse model for pixel-wise SOS reconstruction and solve it with iterative optimization technique. …”
Get full text
Article -
4654
Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction
Published 2025-07-01“…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
Get full text
Article -
4655
Enhancing Vertical Trajectory Reconstruction in SASS-C: Advanced Segmentation, Outlier Detection, and Filtering Techniques
Published 2024-10-01“…The invalid detection algorithm, while incurring a slight computational cost, significantly enhances trajectory accuracy. …”
Get full text
Article -
4656
Recommendations on Chronic Constipation (Including Constipation Associated with Irritable Bowel Syndrome) Treatment
Published 2007-01-01“…The myriad of treatment options available to Canadian physicians can be confusing; thus, the main aim of the recommendations and treatment algorithm is to optimize the approach in clinical care based on available evidence.…”
Get full text
Article -
4657
Toward a unified gait freeze index: a standardized benchmark for clinical and regulatory evaluations
Published 2025-05-01“…Our algorithm is made available as open-source Python code, promoting accessibility and reproducibility.…”
Get full text
Article -
4658
An Effective Hybrid Strategy: Multi-Fuzzy Genetic Tracking Controller for an Autonomous Delivery Van
Published 2025-06-01“…Their output signals are optimally weighted by a genetic algorithm to determine the proper allocation of control signals for calculating the final steering angle. …”
Get full text
Article -
4659
Hybrid Recurrent Neural Network and Decision Tree Scheduling for Energy-Efficient Resource Allocation in Cloud Computing
Published 2025-01-01“…The RNN model uses historical execution data to accurately predict task execution time, while the DT model classifies VMs based on performance characteristics, ensuring optimal task-to- VM assignments. …”
Get full text
Article -
4660
An integrated model of threshold-based scaling and fractional admission controlling to improve resource utilization efficiency in 5G core networks.
Published 2025-01-01“…One requirement is utilizing system resources effectively while ensuring stable system performance. Specifically, the need to optimize unused UPF instances to reduce system costs. …”
Get full text
Article