-
1061
Encoding-Based Machine Learning Approach for Health Status Classification and Remote Monitoring of Cardiac Patients
Published 2025-02-01“…In short, this study aims to explore how ML algorithms can enhance diagnostic accuracy, improve real-time monitoring, and optimize treatment outcomes. …”
Get full text
Article -
1062
Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM
Published 2025-05-01“…MethodsTo address these issues, Multi-Way Improved Whale Optimization Algorithm (MWIWOA) was proposed to optimize the SVM-based prediction model for the internal corrosion rate of long-distance submarine pipelines. …”
Get full text
Article -
1063
Resource Allocation of Multi-Satellite Beam Hopping Technology Based on System Capacity Maximization
Published 2022-12-01Get full text
Article -
1064
User Random Access Technology Based on Beam Hopping Satellite Communication System
Published 2022-03-01Get full text
Article -
1065
Maximum Power Exploitation of Photovoltaic System under Fast-Varying Solar Irradiation and Local Shading
Published 2022-01-01“…In addition, under fast-varying solar irradiation and local shading, the speed, ability, and stability of the improved MPPT system with the PF-MPPT algorithm when tracking the maximum power were 9.52, 1.32, and 1.84 times of the MPPT system with the P&O algorithm and 2.18, 1.41, and 2.00 times of the MPPT system with the particle swarm optimization algorithm, respectively.…”
Get full text
Article -
1066
Time-Dependent Electric Vehicle Routing Problem with Time Windows and Path Flexibility
Published 2020-01-01Get full text
Article -
1067
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
1068
Multidisciplinary Collaborative Reliability Analysis of the Gear Reducer based on Inverse Reliability Strategy
Published 2015-01-01“…The IRS- GA- CO,which not only lifted the coupling between all disciplines to improve the search most probable point,the burden of system- level optimizer also can be significantly reduced. …”
Get full text
Article -
1069
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
1070
基于改进Kriging模型的主动学习可靠性分析方法
Published 2021-01-01“…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
Get full text
Article -
1071
Spatiotemporal pattern analysis of land use in Jiangsu Province based on long-term time series remote sensing images
Published 2025-06-01“…Principal Component Analysis (PCA) was applied to reduce feature dimensionality, and the Random Forest classification algorithm was optimized with Bayesian Optimization and Tree-structured Parzen Estimators (TPE) for improved performance. …”
Get full text
Article -
1072
Power Allocation Technology of Long Time Multi-Star Hopping Beam for LEO Satellite
Published 2023-12-01Get full text
Article -
1073
Cost-efficient dynamic quota-controlled routing in multi-community delay-tolerant networks
Published 2018-05-01Get full text
Article -
1074
Green Energy Strategic Management for Service of Quality Composition in the Internet of Things Environment
Published 2020-01-01“…The simulation results reveal that MFO has good optimization effect in the abovementioned models, and the optimization effect of MFO is improved by 8% and 6% compared with the genetic algorithm and particle swarm optimization, so as to realize the green energy strategic management of QoS composition in the environment of IoT.…”
Get full text
Article -
1075
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
Get full text
Article -
1076
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
Get full text
Article -
1077
A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing
Published 2013-01-01“…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
Get full text
Article -
1078
Subspace-based local compilation of variational quantum circuits for large-scale quantum many-body simulation
Published 2025-06-01“…Simulation of quantum many-body systems is one of the most promising applications of quantum computers. …”
Get full text
Article -
1079
Design and Implementation of Hybrid GA-PSO-Based Harmonic Mitigation Technique for Modified Packed U-Cell Inverters
Published 2024-12-01“…This paper proposes a hybrid version of the GA-PSO algorithm that exploits the exploratory strengths of GA and the convergence efficiencies of PSO in determining the optimized switching angles for SHM techniques applied to modified five-level and seven-level PUC inverters. …”
Get full text
Article -
1080
Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI Circuits
Published 2022-01-01“…Consequently, in conjunction with the optimized floorplan data, the optimized model created by the Improved Harmonic Search Optimization algorithm undergoes testing and investigation in order to estimate the amount of congestion that occurs during the routing process in VLSI circuit design and to minimize the amount of congestion that occurs.…”
Get full text
Article