-
1301
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
1302
Optimized CNN-LSTM with hybrid metaheuristic approaches for solar radiation forecasting
Published 2025-08-01“…The performance of several machine learning and deep learning models, including Long Short-Term Memory, Autoregressive Integrated Moving Average, Multilayer Perceptron, Random Forest, XGBoost, Support Vector Regression, and a hybrid CNN-LSTM model, is evaluated for daily solar radiation forecasting. To improve the accuracy of the model, hyperparameter optimization is applied to the CNN-LSTM model using three metaheuristic algorithms: Particle Swarm Optimization, Grey Wolf Optimization, and Starfish Optimization Algorithm. …”
Get full text
Article -
1303
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01Get full text
Article -
1304
MODEL FOR THE FORMATION OF A PROJECT TEAM COMPOSITION BASED ON DISCRETE OPTIMIZATION METHODS
Published 2025-05-01“…The problem lies in the need to improve the efficiency and effectiveness of projects by optimizing the composition of teams. …”
Article -
1305
Multi-objective Optimization Design of Component Cooling System in HPR1000
Published 2025-03-01“…To manage this complexity, a novel optimization algorithm was implemented to perform multi-objective optimization. …”
Get full text
Article -
1306
An Optimization Method for Indoor Pseudolites Anchor Layout Based on MG-MOPSO
Published 2025-05-01“…Compared to the non-dominated sorting genetic algorithm II (NSGA-II), the convergence speed increases by 33.33% and 36.99%, while optimization accuracy improves by 36.84% and 29.41%. …”
Get full text
Article -
1307
A Comparison of AutoML Hyperparameter Optimization Tools For Tabular Data
Published 2023-05-01“…Therefore, finding the optimal values of these hyperparameters is integral in improving the prediction accuracy of an ML algorithm and the model selection. …”
Get full text
Article -
1308
Optimized YOLOv8 framework for intelligent rockfall detection on mountain roads
Published 2025-04-01“…To enable efficient detection, this study proposes a rockfall detection system based on embedded technology and an improved Yolov8 algorithm, termed Yolov8-GCB. The algorithm enhances detection performance through the following optimizations: (1) integrating a lightweight DeepLabv3+ road segmentation module at the input stage to generate mask images, which effectively exclude non-road regions from interference; (2) replacing Conv convolution units in the backbone network with Ghost convolution units, significantly reducing model parameters and computational cost while improving inference speed; (3) introducing the CPCA (Channel Priori Convolution Attention) mechanism to strengthen the feature extraction capability for targets with diverse shapes; and (4) incorporating skip connections and weighted fusion in the Neck feature extraction network to enhance multi-scale object detection. …”
Get full text
Article -
1309
Beamforming Optimization for Information Enhancement Transmission in MISO SWIPT with NOMA System
Published 2022-01-01“…Detailed simulation experiments indicate that the algorithm improves the performance of NOMA downlink beamforming under the condition of enhancing information and eliminating network interference.…”
Get full text
Article -
1310
Optimized YOLOv8 for enhanced breast tumor segmentation in ultrasound imaging
Published 2025-06-01Get full text
Article -
1311
Bio inspired optimization techniques for disease detection in deep learning systems
Published 2025-05-01“…This research endeavors to elucidate the integration of bio-inspired optimization techniques that improve disease diagnostics through deep learning models. …”
Get full text
Article -
1312
Optimization of Shift Strategy Based on Vehicle Mass and Road Gradient Estimation
Published 2024-11-01“…The experiment verifies that the optimized shift strategy can effectively improve the dynamic performance of the vehicle. …”
Get full text
Article -
1313
Conveyor X-Ray Tomosynthesis Imaging With Optimized Structured Sequential Illumination
Published 2020-01-01“…Subsequently, a genetic algorithm is developed to optimize the exposure sequence of X-ray sources, and mask patterns, and during the dynamic measurement process. …”
Get full text
Article -
1314
Optimizing Feature Selection for IOT Intrusion Detection Using RFE and PSO
Published 2025-06-01“…RFE notably improved kNN and DT accuracy, while SVM showed consistent results regardless of the feature of selection. …”
Get full text
Article -
1315
A New Local Optimal Spline Wavelet for Image Edge Detection
Published 2024-12-01Get full text
Article -
1316
Optimizing Remote Sensing Image Retrieval Through a Hybrid Methodology
Published 2025-05-01Get full text
Article -
1317
Dynamic Coal Flow-Based Energy Consumption Optimization of Scraper Conveyor
Published 2025-06-01“…The multi-objective optimization model for energy consumption is solved using the NSGA-II-ARSBX algorithm, yielding a 33.7% reduction in energy consumption, while the lump coal area is reduced by 27.7%, indicating a trade-off between energy efficiency and coal fragmentation. …”
Get full text
Article -
1318
RIS-assisted terahertz frequency band vehicle network capacity optimization
Published 2023-10-01“…In order to alleviate the spectrum scarcity and capacity limitation of the current wireless system, the terahertz frequency band was introduced and the reconfigurable intelligent surface (RIS) was used for auxiliary communication to construct a downlink vehicle network.Considering the constraints of limited total system power, QoS constraints of cellular mobile users, and randomness constraints of vehicle and user locations, a hybrid optimization model was established for optimal power allocation and optimal deployment of RIS with the aim of maximizing the total rate of vehicle users.Based on the balance method, linear transformation method, and element elimination method, the original NP-hard problem was transformed into a convex optimization problem with complex correlation constraints and multivariate coupling.The inner layer iteration was based on the Lagrange multiplier method to solve the optimal power allocation, and the outer layer iteratively solved the optimal deployment of RIS based on a improved genetic algorithm.The simulation results show that rationally deploying the number and distribution density of RIS nodes based on optimal power allocation can save costs while achieving a higher target total capacity.…”
Get full text
Article -
1319
Enhanced Connectivity Validity Measure Based on Outlier Detection for Multi-Objective Metaheuristic Data Clustering Algorithms
Published 2022-01-01“…The external validity is evaluated using the F-measure, while the performance assessment matrices are employed to assess the quality of Pareto-optimal sets like the coverage and overall non-dominant vector generation. …”
Get full text
Article -
1320
An optimized elliptic curve digital signature strategy for resource-constrained devices
Published 2025-07-01“…The method incorporates two key enhancements: optimizing scalar point multiplication using the cyclic group property of elliptic curve points and the additive inverse property in group theory, and secondly, adopting a deterministic private nonce generation approach, while excluding the public nonce ( $$R$$ ) from the calculation of the challenge to improve signing efficiency. …”
Get full text
Article