Showing 4,001 - 4,020 results of 12,962 for search 'while algorithm', query time: 0.16s Refine Results
  1. 4001

    Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT by Waleed Almuseelem

    Published 2025-01-01
    “…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
    Get full text
    Article
  2. 4002

    Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments by Cancan Tao, Bowen Liu

    Published 2024-12-01
    “…Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
    Get full text
    Article
  3. 4003

    Intelligent End-Edge Computation Offloading Based on Lyapunov-Guided Deep Reinforcement Learning by Xue Feng, Chi Xu, Xi Jin, Changqing Xia, Jing Jiang

    Published 2024-11-01
    “…Then, we employ deep reinforcement learning algorithm, i.e., asynchronous advantage actor-critic (A3C), and propose Lyapunov-guided A3C algorithm named LyA3C to approximate the optimal computation offloading policy. …”
    Get full text
    Article
  4. 4004

    Filter Observer-Based Attitude Control for Moving Mass Satellites Under Strong Aerodynamic Torques by Yuandong Hu, Zhengliang Lu, Wenhe Liao

    Published 2025-01-01
    “…The scheme integrates a moving mass device (MMD) with the traditional reaction wheel actuator to mitigate aerodynamic torques while maintaining effectiveness at varying orbital heights. …”
    Get full text
    Article
  5. 4005

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  6. 4006

    Omnidirectional Motion Trajectory Tracking Control Method for AUVs by Jiangpeng XU, Junlei WANG, Yi TANG

    Published 2024-12-01
    “…Using the Bluefin series AUV as an example, the paper designed and modified the omnidirectional motion structure and developed a trajectory generation algorithm based on the Hermite algorithm, a trajectory guidance algorithm based on the scaling factor, and a sailing-heading hybrid control algorithm. …”
    Get full text
    Article
  7. 4007

    Machine Learning-Based 3D Soil Layer Reconstruction in Foundation Pit Engineering by Chenxi Zhang, Nan Li, Xiuping Dong, Bin Liu, Meilian Liu

    Published 2025-04-01
    “…Therefore, soil layer reconstruction serves as a critical step, while sparse borehole data limit the accuracy of traditional reconstruction methods. …”
    Get full text
    Article
  8. 4008

    Location estimation of UWB-based wireless capsule endoscopy using TDoA in various gastrointestinal simulation models. by Sruthi Krishnan, Mohammed Abdel-Hafez, Matti Hämäläinen

    Published 2025-01-01
    “…Though the present-day wireless capsule endoscopes certified for endoscopic procedures predominantly work on the Medical Implant Communication System (MICS) band, the applications based on the Ultra-Wide Band (UWB) are gaining popularity for their immense possibilities. While received signal strength, time of arrival, phase of arrival, and angle of arrival are the basic parameters applied in research for location estimation of WCE, this paper uses a time difference of arrival (TDoA) approach using the Chan algorithm. …”
    Get full text
    Article
  9. 4009

    A method of identification and localization of tea buds based on lightweight improved YOLOV5 by Yuanhong Wang, Yuanhong Wang, Jinzhu Lu, Jinzhu Lu, Qi Wang, Qi Wang, Zongmei Gao

    Published 2024-11-01
    “…The improved algorithm has higher detection accuracy while reducing the amount of computation and parameters. …”
    Get full text
    Article
  10. 4010

    EV Smart Charging in Distribution Grids–Experimental Evaluation Using Hardware in the Loop Setup by Yunhe Yu, Lode De Herdt, Aditya Shekhar, Gautham Ram Chandra Mouli, Pavol Bauer

    Published 2024-01-01
    “…The results demonstrate that the SC algorithm adequately lowers the EV charging cost while fulfilling the charging demand, and substantially reduces the peak power as well as the overloading duration, even when faced with input data uncertainty. …”
    Get full text
    Article
  11. 4011

    Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR by Mingjun Wang, Xuezhi Zhang, Feng Jing, Mei Gao

    Published 2025-04-01
    “…While BBR offers lower latency and higher throughput compared to traditional congestion control algorithms, it still faces challenges. …”
    Get full text
    Article
  12. 4012

    Internal deformation and damage evolution patterns of red sandstone using regularized digital volume correlation by HAO Yutong, MAO Lingtao, LIU Haizhou, YUAN Zexun, CAO Longkun, LI Dongxiao

    Published 2024-10-01
    “…For the red sandstone specimens, the new algorithm was able to identify sub-voxel microcracks with an aperture of 0.15 voxels, while reducing the computational cost by 85.15%. …”
    Get full text
    Article
  13. 4013

    Full Information Numerical Simulation of Two-Dimensional Steady Ground Temperature Field by Fan Jiang, Shikun Dai, Ying Zhang, Hongjun Tian

    Published 2025-03-01
    “…The results of the algorithm were compared with COMSOL Multiphysics finite element simulation software to verify the correctness of the algorithm and compare and analyze the improvement of the algorithm in computation time and memory consumption under the same mesh division.…”
    Get full text
    Article
  14. 4014

    Coordinated Scheduling for Zero-Wait RGV/ASR Warehousing Systems with Finite Buffers by Wenbin Gu, Na Tang, Lei Wang, Zhenyang Guo, Yushang Cao, Minghai Yuan

    Published 2025-06-01
    “…Additionally, in 15 randomized test scenarios, AMHS demonstrated superior performance over three benchmark algorithms—Genetic Algorithm (GA), Discrete Imperialist Competitive Algorithm (DICA), and Improved Whale Optimization Algorithm (IWOA)—achieving an average makespan reduction of 12.6% relative to GA.…”
    Get full text
    Article
  15. 4015

    A Comparative Analysis of Black-Box and Glass-Box Models for Poplar Plantation Mapping with Remote Sensing Data by M. Y. Ozturk, I. Colkesen

    Published 2025-05-01
    “…A robust black-box algorithm, XGBoost, was utilized as a benchmark algorithm to compare the performance of EBM. …”
    Get full text
    Article
  16. 4016

    Robust adaptive fuzzy type-2 fast terminal sliding mode control of robot manipulators in attendance of actuator faults and payload variation by H. Rahali, S. Zeghlache, B. D. E. Cherif, L. Benyettou, A. Djerioui

    Published 2025-01-01
    “…The technique is based on the Adaptive Fuzzy Type-2 Fast Terminal Sliding Mode Control (AFT2FTSMC) algorithm and is designed to handle actuator faults, uncertainties (such as payload change), and external disturbances. …”
    Get full text
    Article
  17. 4017

    A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection by Zheng Huang, Chengling Jiang, Chao Shen, Bin Liu, Tao Huang, Minghui Zhang

    Published 2025-01-01
    “…To address the RRT* algorithm’s limitation in dynamic obstacle avoidance, a local path-planning method combining the improved DWA algorithm is proposed, improving efficiency in areas with dense obstacles. …”
    Get full text
    Article
  18. 4018

    Dilemma of missing specific disease codes: an approach to assess the incidence and prevalence of a rare nephrology disease by Matthias Roll, Amadeus Gladbach, Isabella Selinger, Thomas Hardt, Helena Himmelhaus, Christian Jacob, Timotheus Stremel, Julia Theil, Jürgen Floege

    Published 2025-07-01
    “…The restrictive algorithm identified cases based on histologically confirmed diagnoses, while the inclusive algorithm included a broader range of related diagnoses. …”
    Get full text
    Article
  19. 4019

    Real-Time Geo-Localization for Land Vehicles Using LIV-SLAM and Referenced Satellite Imagery by Yating Yao, Jing Dong, Songlai Han, Haiqiao Liu, Quanfu Hu, Zhikang Chen

    Published 2025-07-01
    “…Existing Simultaneous Localization and Mapping (SLAM) algorithms provide precise local pose estimation and real-time scene reconstruction, widely applied in autonomous navigation for land vehicles. …”
    Get full text
    Article
  20. 4020

    IAESR: IoT-oriented authenticated encryption based on iShadow round function by Yanshuo Zhang, Liqiu Li, Hengyu Bao, Xiaohong Qin, Zhiyuan Zhang, Xiaoyi Duan

    Published 2025-06-01
    “…Therefore, lightweight AE algorithms must minimize resource consumption while ensuring adequate security. …”
    Get full text
    Article