-
3741
A global object-oriented dynamic network for low-altitude remote sensing object detection
Published 2025-05-01“…This study introduces the Global Object-Oriented Dynamic Network (GOOD-Net) algorithm, comprising three fundamental components: an object-oriented, dynamically adaptive backbone network; a neck network designed to optimize the utilization of global information; and a task-specific processing head augmented for detailed feature refinement. …”
Get full text
Article -
3742
Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations
Published 2017-01-01“…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
Get full text
Article -
3743
Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints
Published 2023-01-01“…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
Get full text
Article -
3744
Robust sparse smooth principal component analysis for face reconstruction and recognition.
Published 2025-01-01“…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
Get full text
Article -
3745
Stratified Object-Oriented Image Classification Based on Remote Sensing Image Scene Division
Published 2018-01-01“…This method firstly uses middle semantic which can reflect an image’s visual complexity to classify the remote sensing image into different scenes, and then within each scene, an improved grid search algorithm is employed to optimize the segmentation result of each scene, so that the optimal scale can be utmostly adopted for each scene. …”
Get full text
Article -
3746
High resolution satellite imaging 0.5U-size freeform telescope for CubeSat
Published 2025-03-01“…The proposed design algorithm proved to be computationally efficient. It enabled to obtain the excellent imaging of the designed telescope, which from mathematical perspective becomes a challenging multi-variable optimization task, unattainable with the standard optimization procedures included in the commercial optical design software.…”
Get full text
Article -
3747
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
3748
Efficient multiplication for finite fields of p characteristic
Published 2009-01-01“…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
Get full text
Article -
3749
Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations
Published 2023-01-01“…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
Get full text
Article -
3750
A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem
Published 2013-01-01“…As a result, the whole approach achieves a longer-term efficient optimization for power saving. …”
Get full text
Article -
3751
Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event
Published 2025-04-01“…Experiments shows that the EDRA algorithm can reduce energy consumption by 32.4% compared to advanced algorithms while ensuring stronger system performance.…”
Get full text
Article -
3752
Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot
Published 2025-01-01“…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
Get full text
Article -
3753
Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network
Published 2025-01-01“…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
Get full text
Article -
3754
Research on Unmanned Aerial Vehicle Path Planning for Carbon Emission Monitoring of Land-Side Heavy Vehicles in Ports
Published 2025-03-01“…In the simulation experiment results, the proposed algorithm outperforms A*, ACO, and IEA algorithms in optimizing path length, reducing collision points to ensure path safety, and robustness. …”
Get full text
Article -
3755
Differentiable architecture search-based automatic modulation recognition for multi-carrier signals
Published 2024-09-01“…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
Get full text
Article -
3756
A grid-based sectoring for energy-efficient wireless sensor networks
Published 2025-04-01“…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
Get full text
Article -
3757
Prediction of Grain Yield in Henan Province Based on Grey BP Neural Network Model
Published 2021-01-01“…BP neural network (BPNN) is widely used due to its good generalization and robustness, but the model has the defect that it cannot automatically optimize the input variables. In response to this problem, this study uses the grey relational analysis method to rank the importance of input variables, obtains the key variables and the best BPNN model structure through multiple training and learning for the BPNN models, and proposes a variable optimization selection algorithm combining grey relational analysis and BP neural network. …”
Get full text
Article -
3758
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01“…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
Get full text
Article -
3759
Energy management in a microgrid equipped with an electric vehicle based on the internet of things considering responsive load
Published 2025-02-01“…A novel Energy-Trading Management Algorithm (ETMA), based on the Meerkat Optimization Algorithm (MOA), is proposed to tackle the complexities of this system. …”
Get full text
Article -
3760
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01“…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
Get full text
Article