-
2061
A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection
Published 2025-01-01“…Based on a breadth-first search strategy, the path obtained is optimized to reduce path complexity. To address the RRT* algorithm’s limitation in dynamic obstacle avoidance, a local path-planning method combining the improved DWA algorithm is proposed, improving efficiency in areas with dense obstacles. …”
Get full text
Article -
2062
Simulation and test study of transmission characteristics of V-shaped rubber belt CVT
Published 2025-06-01“…ObjectiveThe dynamic matching problem of continuously variable transmission (CVT) with the engine and Baja racing car was subjected to research analysis.MethodsThe parameters of key components of CVT were first optimized by genetic algorithm in Matlab software, then the dynamic modeling and simulation of CVT and the whole vehicle were carried out in Matlab/Simulink and RecurDyn, and finally the vehicle test was carried out on the chassis dynamometer.ResultsThe results of modeling simulation and vehicle test show that the dynamic index of Baja racing car is significantly improved after the optimization of the parameters of key components of CVT. …”
Get full text
Article -
2063
Research on the cooperative offloading strategy of sensory data based on delay and energy constraints
Published 2023-03-01“…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
Get full text
Article -
2064
A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing
Published 2013-01-01“…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
Get full text
Article -
2065
Development and Practice of Cloud Collaborative Platform for Downhole Measurement Tools
Published 2025-06-01“…The measurement tools are mainly single machine version, which is difficult to meet the current requirements for improving drilling quality and efficiency. In the paper, based on the remote operation requirements of coreless magnetic steering tool, a platform architecture of five modules, including simulation rehearsal, virtual training, remote operation, smart tool and intelligent decision, was designed in detail, achieving a whole process digitization from predrilling risk assessment and in-drilling acquisition and processing to post-drilling feedback and optimization, and a visual interface was developed. …”
Get full text
Article -
2066
Bio-inspired clustering scheme for Internet of Drones application in industrial wireless sensor network
Published 2019-11-01“…The results indicate that the proposed scheme has improved 60% and 38% with respect to ant colony optimization and grey wolf optimization, respectively, in terms of average cluster building time while average energy consumption has improved 23% and 33% when compared to the ant colony optimization and grey wolf optimization, respectively.…”
Get full text
Article -
2067
Two-Sided Matching on Comprehensive Transportation Network Emergency Vehicles’ Allocation
Published 2021-01-01“…Firstly, based on the needs of both parties involved in the matching, the satisfaction evaluation systems are constructed; with the goal of maximizing the weighted satisfaction of the affected areas and vehicles, the optimization model of the materials and emergency vehicles matching is established; then, an improved National Intern Matching Program (NIMP) algorithm is designed to solve the model, which is based on the k: 1 experimental pairing and updating ideas, and can take into account the capacity and destination constraints of vehicles in the matching process. …”
Get full text
Article -
2068
Exploration of Energy-Saving Chilling Landscape Design Based on Algo for Group Intelligence
Published 2022-01-01“…The experimental results show that the algo for group intelligence outperforms another algorithm in terms of solving ability to the extent that the average optimization ability is improved by 13.45%, so the algo for group intelligence demonstrates its superior ability to take into account both local and global search. …”
Get full text
Article -
2069
Policy Efforts to Promote the Adoption of Autonomous Vehicles: Subsidy and AV Lanes
Published 2023-01-01“…Due to the mutual influence of the two models, an iterative optimization approach is applied to solve the whole model. …”
Get full text
Article -
2070
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
2071
A long-term localization and mapping system for autonomous inspection robots in large-scale environments using 3D LiDAR sensors.
Published 2025-01-01“…Prolonged operation poses the risk of sensor degradation, while the presence of dynamic objects disrupts the stability of the constructed map, consequently impacting the accuracy of robot localization. …”
Get full text
Article -
2072
A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem
Published 2013-01-01“…As a result, the whole approach achieves a longer-term efficient optimization for power saving. …”
Get full text
Article -
2073
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
2074
Adaptive Safe Data Driven Control Strategy for Closed Loop System
Published 2025-01-01“…Finally, some simulation results are given to show our theoretical results on adaptive safe data driven control and its improved switching form. Generally, this new paper extends our previous contributions about data driven control to complete its synthesis research, combining some advanced factors together from both the academic theory and practice, for example, adaptation, safety, optimization theory and algorithm, switching logic together.…”
Get full text
Article -
2075
Hybrid precoding and power allocation for mmWave NOMA systems based on time delay line arrays
Published 2022-06-01“…Methods:To reduce inter-user interference,an improved K-means algorithm is proposed to group users and select a cluster head for each group of users, which maximizes the correlation of user channels in the same cluster and reduces the correlation between users in different clusters as much as possible;Then,a low-complexity analog precoding is designed to maximize the array gain of the antenna based on the relevant user channel matrix composed of the cluster head set, followed by a digital precoding designed to eliminate inter-user interference with the maximum equivalent channel gain between beams using a forced-zero technique; Finally, an EE maximization problem is formed to optimize the transmit power under users'quality of services and total transmit power constraints,and a two-layer iterative algorithm is proposed for the resulting non-convex optimization problem. …”
Get full text
Article -
2076
Microgrid system for electric vehicle charging stations integrated with renewable energy sources using a hybrid DOA–SBNN approach
Published 2025-01-01“…In addition to supporting eco-friendly mobility, the technology lowers grid dependency and improves energy reliability. The manuscript introduces a hybrid technique for efficient electric vehicle (EV) charging integrating the Dollmaker Optimization algorithm (DOA) and spatial Bayesian neural network (SBNN). …”
Get full text
Article -
2077
Pickup and delivery planning for the crowdsourced freight delivery routing problem.
Published 2025-01-01“…The objective is to minimize total service costs, including fixed vehicle costs, transportation costs, and penalty costs for delays, while planning routes that cover all orders. To solve this combinatorial optimization problem, we propose an improved partheno genetic algorithm (IPGA) and a simulated annealing algorithm (SA). …”
Get full text
Article -
2078
Intelligent Dual Basal–Bolus Calculator for Multiple Daily Insulin Injections via Offline Reinforcement Learning
Published 2024-01-01“…Managing blood glucose levels through multiple daily injections (MDIs) of insulin presents a challenge in daily diabetes care, necessitating frequent self-dosing adjustments to avoid glycemic extremes. While essential in MDI treatment, bolus calculators need significant usability improvements due to meal counting and parameter optimization complexities. …”
Get full text
Article -
2079
Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations
Published 2017-01-01“…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
Get full text
Article -
2080
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
Get full text
Article