-
3361
Energy-Efficient UAV Relaying Robust Resource Allocation in Uncertain Adversarial Networks
Published 2021-01-01“…We derive EE UAV relay-user maximization problem in the adversarial wireless networks at last. While the problem is non-convex, we propose an iterative and sub-optimal algorithm to optimize EE UAV relay with constraints, such as ICC, trajectory, speed, acceleration, and transmit power. …”
Get full text
Article -
3362
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
3363
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3364
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
3365
Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning
Published 2025-01-01“…Experimental results demonstrate that the algorithm achieves improved exploration efficiency and adaptability compared to a real-time scheduling method while maintaining computational feasibility. …”
Get full text
Article -
3366
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01“…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
Get full text
Article -
3367
Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation
Published 2021-01-01“…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
Get full text
Article -
3368
Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations
Published 2025-01-01“…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
Get full text
Article -
3369
Gaussian Process Regression with Soft Equality Constraints
Published 2025-01-01“…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
Get full text
Article -
3370
Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty
Published 2024-12-01“…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
Get full text
Article -
3371
Energy Efficiency Maximization for Device-to-Device Communication Underlaying Cellular Networks on Multiple Bands
Published 2016-01-01“…Finally, simulation results demonstrate that the proposed algorithm can achieve the near-optimal EE with much better performance than the conventional algorithm.…”
Get full text
Article -
3372
A global object-oriented dynamic network for low-altitude remote sensing object detection
Published 2025-05-01“…This study introduces the Global Object-Oriented Dynamic Network (GOOD-Net) algorithm, comprising three fundamental components: an object-oriented, dynamically adaptive backbone network; a neck network designed to optimize the utilization of global information; and a task-specific processing head augmented for detailed feature refinement. …”
Get full text
Article -
3373
An integrated model of threshold-based scaling and fractional admission controlling to improve resource utilization efficiency in 5G core networks.
Published 2025-01-01“…One requirement is utilizing system resources effectively while ensuring stable system performance. Specifically, the need to optimize unused UPF instances to reduce system costs. …”
Get full text
Article -
3374
Energy management in a microgrid equipped with an electric vehicle based on the internet of things considering responsive load
Published 2025-02-01“…A novel Energy-Trading Management Algorithm (ETMA), based on the Meerkat Optimization Algorithm (MOA), is proposed to tackle the complexities of this system. …”
Get full text
Article -
3375
Key Nodes Identification Method in Scale-Free Network Based on Structural Holes
Published 2025-01-01“…The proposed algorithm achieves higher accuracy in structural hole-aware ranking compared to benchmarks while maintaining <inline-formula> <tex-math notation="LaTeX">${ O}\left ({{ m+n.logn }}\right)$ </tex-math></inline-formula> complexity. …”
Get full text
Article -
3376
A Lightweight, Intelligent Autonomous Exploration System for Indoor Robots Using Improved Random Walk With Back-Off Strategies
Published 2025-01-01“…The algorithm maintained a reliable average localization error of 0.005 m while exhibiting memory efficiency by the reduced memory usage by up to 13.7% relative to TB3. …”
Get full text
Article -
3377
Intelligent Energy Management in an Isolated DC Microgrid using Fuzzy Logic
Published 2025-01-01“…The PV system is controlled by a MPPT method implementing the INC algorithm, while the storage system is managed by a PI controller to control battery charging and discharging. …”
Get full text
Article -
3378
MAB-RSP: Data pricing based on Stackelberg game in MCS
Published 2025-07-01“…Experiments demonstrate that the algorithm improves revenue while ensuring balanced benefits for all participants.…”
Get full text
Article -
3379
Research on secure transport strategy of mobile edge computing based on deep reinforcement learning
Published 2025-04-01“…Firstly, the mobile edge computing system based on unmanned aerial vehicle (UAV) was studied, which was composed of<italic> I</italic> user devices, <italic>M</italic> legal UAV (L-UAV) and <italic>N</italic> eavesdropping UAV (E-UAV). Secondly, while ensuring the unloading of L-UAV within a specified period, the multi-agent depth deterministic policy gradient (Attention-MADDPG) algorithm with the addition of attention mechanism was adopted to solve and optimize the problem with the aim of maximizing the safety unloading efficiency of the communication system. …”
Get full text
Article -
3380
Multimodal Control by Variable-Structure Neural Network Modeling for Coagulant Dosing in Water Purification Process
Published 2020-01-01“…This method rectifies coagulant dosage effectively while keeping valid coagulation performance. By the way, the MM-P-VSRVNN algorithm can decrease computation time and avoid overfitting learning ability. …”
Get full text
Article