-
4001
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01“…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
Get full text
Article -
4002
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
Get full text
Article -
4003
Intelligent End-Edge Computation Offloading Based on Lyapunov-Guided Deep Reinforcement Learning
Published 2024-11-01“…Then, we employ deep reinforcement learning algorithm, i.e., asynchronous advantage actor-critic (A3C), and propose Lyapunov-guided A3C algorithm named LyA3C to approximate the optimal computation offloading policy. …”
Get full text
Article -
4004
Filter Observer-Based Attitude Control for Moving Mass Satellites Under Strong Aerodynamic Torques
Published 2025-01-01“…The scheme integrates a moving mass device (MMD) with the traditional reaction wheel actuator to mitigate aerodynamic torques while maintaining effectiveness at varying orbital heights. …”
Get full text
Article -
4005
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
4006
Omnidirectional Motion Trajectory Tracking Control Method for AUVs
Published 2024-12-01“…Using the Bluefin series AUV as an example, the paper designed and modified the omnidirectional motion structure and developed a trajectory generation algorithm based on the Hermite algorithm, a trajectory guidance algorithm based on the scaling factor, and a sailing-heading hybrid control algorithm. …”
Get full text
Article -
4007
Machine Learning-Based 3D Soil Layer Reconstruction in Foundation Pit Engineering
Published 2025-04-01“…Therefore, soil layer reconstruction serves as a critical step, while sparse borehole data limit the accuracy of traditional reconstruction methods. …”
Get full text
Article -
4008
Location estimation of UWB-based wireless capsule endoscopy using TDoA in various gastrointestinal simulation models.
Published 2025-01-01“…Though the present-day wireless capsule endoscopes certified for endoscopic procedures predominantly work on the Medical Implant Communication System (MICS) band, the applications based on the Ultra-Wide Band (UWB) are gaining popularity for their immense possibilities. While received signal strength, time of arrival, phase of arrival, and angle of arrival are the basic parameters applied in research for location estimation of WCE, this paper uses a time difference of arrival (TDoA) approach using the Chan algorithm. …”
Get full text
Article -
4009
A method of identification and localization of tea buds based on lightweight improved YOLOV5
Published 2024-11-01“…The improved algorithm has higher detection accuracy while reducing the amount of computation and parameters. …”
Get full text
Article -
4010
EV Smart Charging in Distribution Grids–Experimental Evaluation Using Hardware in the Loop Setup
Published 2024-01-01“…The results demonstrate that the SC algorithm adequately lowers the EV charging cost while fulfilling the charging demand, and substantially reduces the peak power as well as the overloading duration, even when faced with input data uncertainty. …”
Get full text
Article -
4011
Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR
Published 2025-04-01“…While BBR offers lower latency and higher throughput compared to traditional congestion control algorithms, it still faces challenges. …”
Get full text
Article -
4012
Internal deformation and damage evolution patterns of red sandstone using regularized digital volume correlation
Published 2024-10-01“…For the red sandstone specimens, the new algorithm was able to identify sub-voxel microcracks with an aperture of 0.15 voxels, while reducing the computational cost by 85.15%. …”
Get full text
Article -
4013
Full Information Numerical Simulation of Two-Dimensional Steady Ground Temperature Field
Published 2025-03-01“…The results of the algorithm were compared with COMSOL Multiphysics finite element simulation software to verify the correctness of the algorithm and compare and analyze the improvement of the algorithm in computation time and memory consumption under the same mesh division.…”
Get full text
Article -
4014
Coordinated Scheduling for Zero-Wait RGV/ASR Warehousing Systems with Finite Buffers
Published 2025-06-01“…Additionally, in 15 randomized test scenarios, AMHS demonstrated superior performance over three benchmark algorithms—Genetic Algorithm (GA), Discrete Imperialist Competitive Algorithm (DICA), and Improved Whale Optimization Algorithm (IWOA)—achieving an average makespan reduction of 12.6% relative to GA.…”
Get full text
Article -
4015
A Comparative Analysis of Black-Box and Glass-Box Models for Poplar Plantation Mapping with Remote Sensing Data
Published 2025-05-01“…A robust black-box algorithm, XGBoost, was utilized as a benchmark algorithm to compare the performance of EBM. …”
Get full text
Article -
4016
Robust adaptive fuzzy type-2 fast terminal sliding mode control of robot manipulators in attendance of actuator faults and payload variation
Published 2025-01-01“…The technique is based on the Adaptive Fuzzy Type-2 Fast Terminal Sliding Mode Control (AFT2FTSMC) algorithm and is designed to handle actuator faults, uncertainties (such as payload change), and external disturbances. …”
Get full text
Article -
4017
A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection
Published 2025-01-01“…To address the RRT* algorithm’s limitation in dynamic obstacle avoidance, a local path-planning method combining the improved DWA algorithm is proposed, improving efficiency in areas with dense obstacles. …”
Get full text
Article -
4018
Dilemma of missing specific disease codes: an approach to assess the incidence and prevalence of a rare nephrology disease
Published 2025-07-01“…The restrictive algorithm identified cases based on histologically confirmed diagnoses, while the inclusive algorithm included a broader range of related diagnoses. …”
Get full text
Article -
4019
Real-Time Geo-Localization for Land Vehicles Using LIV-SLAM and Referenced Satellite Imagery
Published 2025-07-01“…Existing Simultaneous Localization and Mapping (SLAM) algorithms provide precise local pose estimation and real-time scene reconstruction, widely applied in autonomous navigation for land vehicles. …”
Get full text
Article -
4020
IAESR: IoT-oriented authenticated encryption based on iShadow round function
Published 2025-06-01“…Therefore, lightweight AE algorithms must minimize resource consumption while ensuring adequate security. …”
Get full text
Article