-
4021
Identity-Based Online/Offline Encryption Scheme from LWE
Published 2024-09-01“…In addition, devices with limited computing power are becoming increasingly common in practice, making it increasingly important to improve the efficiency of online computation of encryption algorithms. The classic solution is to directly improve the efficiency of the Gaussian sampling algorithm, thereby increasing the overall efficiency of the scheme. …”
Get full text
Article -
4022
Surfel-based lightweight LiDAR-inertial SLAM system for UAV pose estimation
Published 2025-06-01“…The proposed surfel-based LiDAR point cloud registration algorithm achieves point cloud registration and pose estimation by minimizing the distance between points and surfels, while reducing the algorithm′s computational complexity and ensuring lightweight operation by discarding un-stable surface elements. …”
Get full text
Article -
4023
A location semantic privacy protection model based on spatial influence
Published 2025-04-01“…Secondly, a diversified semantic dummy location selecting algorithm is proposed to resist semantic attacks. To enhance the availability of traffic trajectory data while safeguarding location semantics, a Hilbert curves is used to reduce the area of anonymous regions, and a diversified semantic anonymous set is constructed. …”
Get full text
Article -
4024
Smart IoT-driven precision agriculture: Land mapping, crop prediction, and irrigation system.
Published 2025-01-01“…As the world population is increasing day by day, so is the need for more advanced automated precision agriculture to meet the increasing demands for food while decreasing labor work and saving water for crops. …”
Get full text
Article -
4025
GES-YOLO: A Light-Weight and Efficient Method for Conveyor Belt Deviation Detection in Mining Environments
Published 2025-02-01“…The core of this algorithm is to enhance the model’s ability to extract features in complex scenarios, thereby improving the detection efficiency. …”
Get full text
Article -
4026
Error Handling Method for Improving BDS Monitoring Accuracy of Bridge Deformation
Published 2022-01-01“…The error vector amplitude achieved by the RLS-CMA equalisation algorithm is lower than those of the CMA equalisation and nonequalisation algorithms, while its accuracy is increased by 17%. …”
Get full text
Article -
4027
User scheduling and power allocation strategy for cell-free networks based on federated learning
Published 2024-09-01“…Simulation results demonstrate that compared to other comparison algorithms, the proposed algorithm achieves a 47.19% increase in downlink throughput, a 22.60% increase in uplink throughput, and a 57.33% reduction in FL task time consumption, while minimizing time overhead for achieving the same model accuracy…”
Get full text
Article -
4028
Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot
Published 2025-01-01“…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
Get full text
Article -
4029
Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network
Published 2025-01-01“…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
Get full text
Article -
4030
Near-Field Hierarchical Localization for Integrated Sensing and Communication
Published 2025-01-01“…The algorithm can be implemented with large antenna arrays, and large intelligent surfaces. …”
Get full text
Article -
4031
Non-Vertical Well Trajectory Design Based on Multi-Objective Optimization
Published 2025-07-01“…Simulation experiments show that the DR-NSGA-III-MGA algorithm is stable in a variety of complex problems, while maintaining good convergence, and has good generalization ability and practical application value.…”
Get full text
Article -
4032
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01“…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. In our Q-learning algorithm, based on the action state space established by transmission power and channel resources, the optimization problem is transformed into solving using a reward function. …”
Get full text
Article -
4033
Unified Analysis of Decentralized Gradient Descent: A Contraction Mapping Framework
Published 2025-01-01“…The use of these tools yields tight convergence bounds, both in the noise-free and noisy regimes. While these bounds are qualitatively similar to results found in the literature, our approach using contractions together with the MHT decouples the algorithm dynamics (how quickly the algorithm converges to its fixed point) from its asymptotic convergence properties (how far the fixed point is from the global optimum). …”
Get full text
Article -
4034
Optimal diagnostic strategy for coronavirus disease 2019 detection in liver transplant recipients: Critical review of available evidence
Published 2021-01-01“…Liver transplant centers should validate the algorithm presented herein, which is based on existing evidence and designed to maximize patient and provider safety, while assuring accuracy in diagnosis.…”
Get full text
Article -
4035
Time-Efficient Path Planner in 3D Obstacle-Rich Environments Considering the Maximum Turn Rate of a Fixed-Wing Aerial Vehicle
Published 2025-02-01“…A time-efficient path plan algorithm is important for the real-time navigation of a fixed-wing autonomous aerial vehicle in unknown 3D obstacle-rich environments. …”
Get full text
Article -
4036
Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks
Published 2025-02-01“…Extracting meaningful and important location points from massive trajectory data for clustering, an improved hidden Markov model is used to predict the user’s next location by analyzing the patterns of the user’s historical mobile trajectory data. The Q-learning algorithm is then used to determine the optimal network handover based on the current network state, while a seamless handover protocol is introduced to ensure successful network transition and uninterrupted data transmission. …”
Get full text
Article -
4037
FPGA-Based Deep Neural Network Implementation for Handwritten Digit Recognition
Published 2025-01-01“…The proposed network achieves promising results in terms of system simplicity and low consumption of hardware resources while maintaining acceptable recognition accuracy and algorithm execution speed at the same time. …”
Get full text
Article -
4038
Guide Robot Based on Image Processing and Path Planning
Published 2025-06-01“…While guide dogs remain the primary aid for visually impaired individuals, robotic guides continue to be an important area of research. …”
Get full text
Article -
4039
Linguistic Intuitionistic Fuzzy VIKOR Method with the Application of Artificial Neural Network
Published 2025-06-01“…In the LIF-VIKOR algorithm, the proposed correlation coefficient is used for ranking alternatives, while the entropy method is applied to compute weights. …”
Get full text
Article -
4040
Gaussian Process Regression with Soft Equality Constraints
Published 2025-01-01“…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
Get full text
Article