-
8081
Traffic signal active control method for short-distance intersections.
Published 2025-01-01“…In order to perform fast computation and solution for the active control scheme, this paper builds a solution algorithm based on deep reinforcement learning and optimizes the problem of reward sparsity in the algorithm, which improves the ability of active control in terms of state space and reward function. …”
Get full text
Article -
8082
HSimulator: Hybrid Stochastic/Deterministic Simulation of Biochemical Reaction Networks
Published 2017-01-01Get full text
Article -
8083
Efficiency Design of Traction Inverters Based on Deep Learning and TRIZ
Published 2022-12-01“…In addition, this paper designs human-computer interaction software based on TRIZ-CRNN to improve the operation intelligence of computer aided innovation system and optimize the application feasibility of TRIZ-CRNN algorithm.…”
Get full text
Article -
8084
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism
Published 2015-10-01Get full text
Article -
8085
Adjoint-based RCS surface sensitivity calculation for very large electrical size object
Published 2025-05-01“…To address these challenges, we developed a surface sensitivity technique based on the multilevel fast multipole algorithm (MLFMA). An access and storage of sparse partial derivative tensor was improved to significantly enhanced the computation performance. …”
Get full text
Article -
8086
YOLOv9-GSSA model for efficient soybean seedlings and weeds detection
Published 2025-12-01Get full text
Article -
8087
FastGEMF: Scalable High-Speed Simulation of Stochastic Spreading Processes Over Complex Multilayer Networks
Published 2025-01-01“…Inspired by the Gillespie algorithm and optimized for efficiency, FastGEMF achieves logarithmic time complexity per event, enabling simulations on networks with millions of nodes and edges without sacrificing accuracy. …”
Get full text
Article -
8088
Detection of the permutation symmetry in pattern sets
Published 2006-01-01“…There exists an interesting algorithmic problem to search for the symmetry of a high-dimensional system. …”
Get full text
Article -
8089
Retrieval of Parameters for Three-Layer Media with Nonsmooth Interfaces for Subsurface Remote Sensing
Published 2012-01-01“…The inversion algorithm is implemented as a modified conjugate-gradient-based nonlinear optimization. …”
Get full text
Article -
8090
Distributed and efficient identity authentication based on consortium blockchain
Published 2022-03-01Get full text
Article -
8091
Sonar-Based Simultaneous Localization and Mapping Using the Semi-Direct Method
Published 2024-12-01“…To obtain better feature extraction results in specific directions, we propose a method that accelerates the computation of the two-dimensional SO-CFAR algorithm, with the time cost being only a very slight increase compared to the one-dimensional SO-CFAR. …”
Get full text
Article -
8092
A deep decentralized privacy-preservation framework for online social networks
Published 2024-12-01Get full text
Article -
8093
Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM
Published 2025-05-01“…MethodsTo address these issues, Multi-Way Improved Whale Optimization Algorithm (MWIWOA) was proposed to optimize the SVM-based prediction model for the internal corrosion rate of long-distance submarine pipelines. …”
Get full text
Article -
8094
A student academic performance prediction model based on the interval belief rule base
Published 2025-08-01Get full text
Article -
8095
Coordinated beamforming for cognitive multi-cell networks with wiretap channels
Published 2014-11-01“…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
Get full text
Article -
8096
A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks
Published 2025-01-01“…This work introduces an Intrusion Detection System (IDS) framework that integrates Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks in a hybrid architecture, enhanced by an attention mechanism to improve feature extraction and classification accuracy. To address computational demands, an enhanced Particle Swarm Optimization (PSO) algorithm is implemented for dynamic feature selection, thereby optimizing the system’s efficiency in high-dimensional data environments characteristic of IoT networks. …”
Get full text
Article -
8097
Cost Function Approach for Dynamical Component Analysis: Full Recovery of Mixing and State Matrix
Published 2024-08-01“…A reformulation of the dynamical component analysis (DyCA) via an optimization-free approach is presented. The original cost function approach is converted into a numerical linear algebra problem, i.e., the computation of coupled singular-value decompositions. …”
Get full text
Article -
8098
-
8099
DESIGN OF COMPACT BANDPASS QUASI-ELLIPTIC MICROSTRIP FILTERS
Published 2018-12-01“…This paper considers an algorithm for development of the sixth order compact microstrip bandpass filters with quasi-elliptic characteristics. …”
Get full text
Article -
8100
Group Stable Matching Problem in Freight Pooling Service of Vehicle–Cargo Matching Platform
Published 2025-06-01“…Since this model is a mixed-integer linear programming model with relatively few decision variables but a large number of constraints, this paper introduces the cutting-plane algorithm. Based on the characteristics of the problem, the algorithm is improved by removing ineffective constraints and only using key constraints, significantly reducing computational complexity, optimizing the solving process, and greatly improving the model’s solution efficiency. …”
Get full text
Article