-
2921
5G-oriented information sharing mechanism within D2D clusters
Published 2016-01-01“…Device-to-Device(D2D)communication is an important technology in 5G network.It helps to improve the transmission efficiency of data dissemination services.However,due to the extra signaling overhead caused by D2D communications,currently most of enhanced-multicast solutions cannot solve the contradiction between high-efficient data transmission and low-efficient signaling procedure,so as to reduce the overall performance gain.An intra-cluster D2D information sharing algorithm based on matrix analysis which includes centralized and distributed modes was proposed.The proposed algorithm could significantly reduce D2D retransmission times in clusters by adaptively selecting the optimal transmitters and data packets for D2D multicast retransmission,achieving the aim of reducing signaling overhead and transmission delay.…”
Get full text
Article -
2922
A neighborhood search-based heuristic for the dynamic vehicle routing problem
Published 2025-05-01“…The DSNR achieved improvements of 15% to 17% in terms of distance and final delivery costs.…”
Get full text
Article -
2923
Edge-Fog Computing-Based Blockchain for Networked Microgrid Frequency Support
Published 2025-01-01“…The parameters and hyperparameters of the LSTM-MFPC are optimized using the Bayesian Adaptive Direct Search (BADS) algorithm. …”
Get full text
Article -
2924
Intelligent Data Reduction for IoT: A Context-Driven Framework
Published 2025-01-01“…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
Get full text
Article -
2925
Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems
Published 2020-01-01“…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
Get full text
Article -
2926
DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions
Published 2025-01-01“…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
Get full text
Article -
2927
Deep Mining on the Formation Cycle Features for Concurrent SOH Estimation and RUL Prognostication in Lithium-Ion Batteries
Published 2025-04-01“…Models that integrate all formation-related data yielded the lowest root mean square error (RMSE) of 2.928% for capacity estimation and 16 cycles for RUL prediction, highlighting the significant role of surface-level physical features in improving accuracy. …”
Get full text
Article -
2928
Distributed Dynamic Traffic Modeling and Implementation Oriented Different Levels of Induced Travelers
Published 2015-01-01“…To testify the effectiveness of the proposed model in optimizing traffic network operation and minimizing traveler’s cost on different induced levels, a sequence numerical experiment is conducted. …”
Get full text
Article -
2929
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
2930
Capacity Estimation and Knee Point Prediction Using Electrochemical Impedance Spectroscopy for Lithium Metal Battery Degradation via Machine Learning
Published 2025-07-01“…To reduce data complexity and improve model efficiency, the input by selecting specific frequency points based on SHAP values is further optimized. …”
Get full text
Article -
2931
Lightweight YOLOv8s-Based Strawberry Plug Seedling Grading Detection and Localization via Channel Pruning
Published 2024-11-01“…[Methods]The YOLOv8s model was selected as the baseline for detecting different categories of seedlings in the strawberry plug tray cultivation process, namely weak seedlings, normal seedlings, and plug holes. To improve the detection efficiency and reduce the model's computational cost, the layer-adaptive magnitude-based pruning(LAMP) score-based channel pruning algorithm was applied to compress the base YOLOv8s model. …”
Get full text
Article -
2932
Recent advances in machine learning applications for MXene materials: Design, synthesis, characterization, and commercialization for energy and environmental applications
Published 2025-07-01“…Techniques such as genetic algorithms, evolutionary algorithms, and Bayesian optimization accelerate the discovery of novel MXene phases tailored for specific uses. …”
Get full text
Article -
2933
A Lightweight YOLO-Based Architecture for Apple Detection on Embedded Systems
Published 2025-04-01“…In Mexico, the manual detection of damaged apples has led to inconsistencies in product quality, a problem that can be addressed by integrating vision systems with machine learning algorithms. The YOLO (You Only Look Once) neural network has significantly improved fruit detection through image processing and has automated several related tasks. …”
Get full text
Article -
2934
Selective Cleaning Enhances Machine Learning Accuracy for Drug Repurposing: Multiscale Discovery of MDM2 Inhibitors
Published 2025-07-01“…Cancer remains one of the most formidable challenges to human health; hence, developing effective treatments is critical for saving lives. …”
Get full text
Article -
2935
Capacity-Constrained Contraflow Adaption for Lane Reconfiguration in Evacuation Planning
Published 2018-01-01“…This paper presents a heuristic contraflow-based reconfiguration evacuation algorithm, which is named Capacity-Constrained Contraflow Adaption (CC-Adap). …”
Get full text
Article -
2936
Using Deep Learning Techniques to Enhance Blood Cell Detection in Patients with Leukemia
Published 2024-12-01“…This supports early diagnosis and monitoring, which leads to more effective treatments and improved results for cancer patients. To accomplish this task, we use digital image processing techniques and then apply the convolutional neural network (CNN) deep learning algorithm to blood sample images. …”
Get full text
Article -
2937
Comparison of Machine Learning Methods for Predicting Electrical Energy Consumption
Published 2025-02-01“…Data pre-processing, specifically min-max normalization, is crucial for improving the accuracy of distance-based algorithms like KNN. …”
Get full text
Article -
2938
Notice of Violation of IEEE Publication Principles: Dynamic Embedding and Scheduling of Service Function Chains for Future SDN/NFV-Enabled Networks
Published 2019-01-01“…If the resource and QoS requirements of the VNFs are not satisfied, a re-embedding and re-scheduling scheme will be triggered in order to optimize certain existing VNFs. The dynamic embedding and scheduling algorithm has flexible network function placement and improves the underlying resource utilization. …”
Get full text
Article -
2939
Reducing Safety Risks in Construction Tower Crane Operations: A Dynamic Path Planning Model
Published 2024-11-01“…To reduce safety risks in construction tower crane operations, this research proposes a dynamic path planning model for tower crane operations based on computer vision technology and dynamic path planning algorithms. The proposed model consists of three modules: first, a path information collection module preprocessing the video data to capture relevant operational path information; second, a path safety risk evaluation module employing You Only Look Once version 8 (YOLOv8) instance segmentation to identify potential risk factors along the operational path, e.g., potential drop zones and the positions of nearby workers; and finally, a path planning module utilizing an improved Dynamic Window Approach for tower cranes (TC-DWA) to avoid risky areas and optimize the operational path for enhanced safety. …”
Get full text
Article -
2940
Prediction Model of Household Carbon Emission in Old Residential Areas in Drought and Cold Regions Based on Gene Expression Programming
Published 2025-07-01“…., electricity usage and heating energy consumption) were selected using Pearson correlation analysis and the Random Forest (RF) algorithm. Subsequently, a hybrid prediction model was constructed, with its parameters optimized by minimizing the root mean square error (RMSE) as the fitness function. …”
Get full text
Article