-
3901
A Cloud-Computing-Based Data Placement Strategy in High-Speed Railway
Published 2012-01-01“…The semi-definite programming algorithm is suitable for the placement of files with various replications, ensuring that different replications of a file are placed on different storage devices, while the dynamic interval mapping algorithm ensures better self-adaptability of the data storage system. …”
Get full text
Article -
3902
Ant Colony Optimization for Jakarta Historical Tours: A Comparative Analysis of GPS and Map Image Approaches
Published 2025-02-01“…The ant colony optimization (ACO) algorithm is implemented in several topics, particularly in solving combinatorial optimization problems. …”
Get full text
Article -
3903
Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence
Published 2025-07-01“…The proposed model incorporates a work order correlation matching algorithm, a fault interval detection algorithm, an electricity consumption prediction algorithm, and a business anomaly identification algorithm. …”
Get full text
Article -
3904
Calibration and Uncertainty Analysis of Freundlich and Langmuir Isotherms Using the Markov Chain Monte Carlo (MCMC) Approach
Published 2024-10-01“…The Metropolis algorithm’s runtime was 5.8 times that of the Gibbs algorithm. …”
Get full text
Article -
3905
Federated Reinforcement Learning-Based Dynamic Resource Allocation and Task Scheduling in Edge for IoT Applications
Published 2025-03-01“…Experimental outcomes show that the method we suggest is better than those used in best-fit, first-fit, and worst-fit basic algorithms. It maintains power stability usage among edge servers while surpassing old-fashioned heuristic techniques. …”
Get full text
Article -
3906
Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation
Published 2025-06-01“…The tracking accuracy has been improved and the applicability of the algorithm for rapid deployment has been enhanced.…”
Get full text
Article -
3907
Multi-Humanoid Robot Arm Motion Imitation and Collaboration Based on Improved Retargeting
Published 2025-03-01“…Traditional retargeting algorithms, while effective in mapping human motion to robots, typically either ensure similarity in arm configuration (joint space-based) or focus solely on tracking the end-effector position (Cartesian space-based). …”
Get full text
Article -
3908
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01“…To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.…”
Get full text
Article -
3909
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01“…First, a router selecting based algorithm on location diversity and RTT was proposed; then a hierarchical location-diversity-based low-delay anonymous communication framework was presented.The framework’s security was analyzed and an evaluation algorithm for security was presented. …”
Get full text
Article -
3910
Integrated Guidance and Control for Strap-Down Flight Vehicle: A Deep Reinforcement Learning Approach
Published 2025-05-01“…Secondly, a channel-by-channel progressive training method based on the twin delayed deep deterministic policy gradient (TD3) algorithm is proposed. The agents of the pitch and yaw channels are trained using the TD3 algorithm independently, which substantially alleviates the complexity of the training process, while the roll channel is stabilized through the application of the back-stepping method. …”
Get full text
Article -
3911
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.
Published 2025-01-01“…The proposed algorithm markedly reduces the number of encryption rounds to one while enhancing both efficiency and security. …”
Get full text
Article -
3912
Integrated Navigation Method for Orchard-Dosing Robot Based on LiDAR/IMU/GNSS
Published 2024-10-01“…Next, an improved A* algorithm was introduced to ensure the global operational path maintained a safe distance from obstacles, while the DWA algorithm handled dynamic obstacle avoidance. …”
Get full text
Article -
3913
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article -
3914
Optimized Airspace Structures and Sequencing Method for Urban Logistics Droneport
Published 2025-03-01“…Experimental results demonstrate that the proposed airspace design reduces take-off/landing time by 34.8% compared to conventional funnel-shaped configurations. The sequencing algorithm prioritizes high-value missions while reducing the average waiting time for low-battery drones by 47.3%, effectively alleviating endurance pressures. …”
Get full text
Article -
3915
Bandit-Based Multiple Access Approach for Multi-Link Operation in Heterogeneous Dynamic Networks
Published 2025-01-01“…The MP-CUCB algorithm enables each MLD to independently make access decisions to improve throughput while guaranteeing the fairness requirements of SLDs. …”
Get full text
Article -
3916
Ambiguity-aware semi-supervised learning for leaf disease classification
Published 2025-04-01“…The results indicate that our semi-supervised method reduces the reliance for fully labeled datasets while preserving high accuracy by utilizing the ambiguity rejection algorithm. …”
Get full text
Article -
3917
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…This structure enhances both security and transparency while fostering collaborative efforts across different stakeholders. …”
Get full text
Article -
3918
Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems
Published 2025-04-01“…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
Get full text
Article -
3919
Research on GNNs with stable learning
Published 2025-08-01“…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
Get full text
Article -
3920
A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index
Published 2025-02-01“…The algorithm was used to evaluate target ships (TS) using the CRI values, adapt the ship domain based on QSD, and use the velocity obstacle (VO) method to determine feasible avoidance paths while adhering to the International Regulations for Preventing Collisions at Sea (COLREGs). …”
Get full text
Article