-
3701
Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation
Published 2025-06-01“…This is done based on the principle of minimizing the overall error, enabling the dynamic and adaptive optimization of the look-ahead distance within the pure pursuit algorithm. …”
Get full text
Article -
3702
Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations
Published 2025-01-01“…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
Get full text
Article -
3703
Maintenance Scheduling Strategy for MMCs Within an MVDC System Using Sensitivity Analysis
Published 2024-01-01“…The proposed algorithm optimizes the maintenance timing and priority by performing a sensitivity analysis of the system reliability indicators, from both the consumer and operator perspectives. …”
Get full text
Article -
3704
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…This algorithm not only streamlines the signature process across chains but also strengthens system security and optimizes storage efficiency, addressing a key challenge in multi-chain systems. …”
Get full text
Article -
3705
About a Routing Problem of the Tool Motion on Sheet Cutting
Published 2015-04-01“…An optimal procedure based on the dynamic programming and an effective heuristic algorithm realized on a multicore computer are proposed. …”
Get full text
Article -
3706
Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering
Published 2024-06-01“…Moreover, the transmit power of DUE was optimized to maximize the system sum rate while ensured that DUE did not cause serious interference to CUE. …”
Get full text
Article -
3707
Aircraft Flight Autonomous Decision-Making Method Based on Target Predicted Trajectory and Markov Decision Process
Published 2024-12-01“…Secondly, we adopt the Markov Decision Process as the autonomous decision-making method for the own aircraft, proposing a method by which to calculate the optimal decision sequence based on the prediction scenarios of the IMM algorithm; that is, in both multi-step prediction and single-step prediction scenarios, the payoff values of different action strategies at each decision moment are calculated to obtain the optimal decision sequence. …”
Get full text
Article -
3708
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
3709
Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography
Published 2013-01-01“…Our numerical simulations indicate that the proposed algorithm can manage well with noisy measurements, allowing a dose reduction by a factor of 4, while reducing noise and streak artifacts in the FBP reconstruction, comparable to the performance of a statistically based iterative algorithm.…”
Get full text
Article -
3710
WSNs data acquisition by combining expected network coverage and clustered compressed sensing.
Published 2025-01-01“…Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. …”
Get full text
Article -
3711
Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM
Published 2025-05-01“…The extended search mode was refined by integrating the simplex method, while the optimization capability of the Whale Optimization Algorithm (WOA) was enhanced with Levy flight to improve step length. …”
Get full text
Article -
3712
DLML-PC: an automated deep learning and metric learning approach for precise soybean pod classification and counting in intact plants
Published 2025-07-01“…After 200 epochs, the recognition results of various object detection algorithms were compared to obtain the optimal model. …”
Get full text
Article -
3713
Accelerated Tensor Robust Principal Component Analysis via Factorized Tensor Norm Minimization
Published 2025-07-01“…Experimental results demonstrate that our algorithm achieves significantly faster performance than existing reference methods known for efficient computation while maintaining high accuracy in recovering low-rank tensors for applications such as color image recovery and background subtraction.…”
Get full text
Article -
3714
Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration
Published 2025-01-01“…With the improvement of hyperspectral image resolution, existing anomaly detection algorithms find it challenging to quickly process large volumes of hyperspectral data while fully exploiting spectral information. …”
Get full text
Article -
3715
A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index
Published 2025-02-01“…This paper proposes a multi-ship collision avoidance algorithm that integrates the quaternion ship domain (QSD) and collision risk index (CRI) to assess collision risk and generate optimal avoidance trajectories. …”
Get full text
Article -
3716
Application of RNA-seq for single nucleotide variation identification in a cohort of patients with hypertrophic cardiomyopathy
Published 2025-05-01“…The algorithm was evaluated and the optimal quality threshold was determined based on allelic discrimination for the rs397516037 mutation (MYBPC3 c.3697 C > T) among patients. …”
Get full text
Article -
3717
A Time- and Space-Integrated Expansion Planning Method for AC/DC Hybrid Distribution Networks
Published 2025-04-01“…A modified graph attention network (MGAT)-based deep reinforcement learning (DRL) algorithm is used for optimization, balancing economic and reliability objectives. …”
Get full text
Article -
3718
Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness
Published 2025-05-01“…We compare the proposed algorithm with optimal and approximate algorithms across graphs of varying scales. …”
Get full text
Article -
3719
Zynq FPGA-Based Acceleration of Kernelized Correlation Filters via High-Level Synthesis of a Custom DFT Block
Published 2024-04-01“…Within this framework, a custom combined DFT and inverse DFT IP, named CDFT, is developed and optimized on the Programmable Logic (PL) side of the Xilinx ZCU102 FPGA, whereas the rest of the KCF algorithm is run with customized Petalinux build on the (Processing System) side. …”
Get full text
Article -
3720
Local Search-Based Metaheuristic Methods for the Solid Waste Collection Problem
Published 2023-01-01“…The routing solver in the Google OR-tools solver is utilised with three well-known metaheuristic methods for neighbourhood exploration: a guided local search (GLS), a tabu search (TS), and simulated annealing (SA), with two initialisation strategies, Clarke and Wright’s algorithm and the nearest neighbour algorithm. Results showed that optimal solutions are found in faster computational times than using only an IP solver, especially for large instances. …”
Get full text
Article