Showing 1,261 - 1,280 results of 2,509 for search '(shift OR soft) algorithm', query time: 0.16s Refine Results
  1. 1261

    SDN Controller Selection and Secure Resource Allocation by Sasibhushana Rao Pappu, Kalyana Chakravarthy Chilukuri

    Published 2025-01-01
    “…Here, user registration, load balancing, attack detection, controller selection, and resource allocation phases are included. Utilizing XOR Left Shift (XORLS), the user details are secured by IP traceback and hash codes are generated using the Mid Square-based KECCAK 512 (MS-KECCAK 512) algorithm. …”
    Get full text
    Article
  2. 1262
  3. 1263

    Control strategy of robotic manipulator based on multi-task reinforcement learning by Tao Wang, Ziming Ruan, Yuyan Wang, Chong Chen

    Published 2025-02-01
    “…To tackle this issue, instead of uniform parameter sharing, we propose an adjudicate reconfiguration network model, which we integrate into the Soft Actor-Critic (SAC) algorithm to address the optimization problems brought about by parameter sharing in multi-task reinforcement learning algorithms. …”
    Get full text
    Article
  4. 1264

    GSB: GNGS and SAG-BiGRU network for malware dynamic detection. by Zhanhui Hu, Guangzhong Liu, Xinyu Xiang, Yanping Li, Siqing Zhuang

    Published 2024-01-01
    “…For solving the problem, this study proposed the GNGS algorithm to construct a new balance dataset for the model algorithm to pay more attention to the feature learning of the minority attacks' malware to improve the detection rate of attacks' malware. …”
    Get full text
    Article
  5. 1265

    Advanced day-ahead scheduling of HVAC demand response control using novel strategy of Q-learning, model predictive control, and input convex neural networks by Rahman Heidarykiany, Cristinel Ababei

    Published 2025-05-01
    “…As a novel RL approach, the proposed algorithm generates day-ahead HVAC demand response (DR) signals in smart homes that optimally reduce and/or shift peak energy usage, reduce electricity costs, minimize user discomfort, and honor in a best-effort way the recommendations from utility/aggregator, which in turn has impact on the overall well being of the distribution network controlled by the aggregator. …”
    Get full text
    Article
  6. 1266

    Computational Adaptive Optics for HAR Hybrid Trench Array Topography Measurement by Utilizing Coherence Scanning Interferometry by Wenyou Qiao, Zhishan Gao, Qun Yuan, Lu Chen, Zhenyan Guo, Xiao Huo, Qian Wang

    Published 2025-06-01
    “…Here, we propose a computational aberration correction method for measuring the topography of the HAR structure by the particle swarm optimization (PSO) algorithm without constructing a database and prior knowledge, and a phase filter in the spatial frequency domain is constructed to restore interference signals distorted by shift-variant aberrations. …”
    Get full text
    Article
  7. 1267

    Computation offloading scheme for RIS-empowered UAV edge network by Bin LI, Wenshuai LIU, Wancheng XIE, Zesong FEI

    Published 2022-10-01
    “…In order to address the challenge of low offloading rate caused by the obstacles blocking in the links between unmanned aerial vehicle (UAV) and ground users (GU) in urban scene, a partial task offloading scheme for UAV-enabled mobile edge computing with the aid of reconfigurable intelligence surface was proposed.A nonconvex and multivariable coupling stochastic optimization problem was formulated by the joint design of the computation task allocation, the transmit power of GU, the phase shift of RIS, UAV computation resource, and UAV trajectory, aiming at maximizing the minimum average data throughput of GU.By leveraging the properties of mathematical expectation, the stochastic optimization problem was transformed into a deterministic optimization problem.Then, the deterministic optimization problem was decomposed into three subproblems by using the block coordinate descent (BCD) algorithm.By introducing auxiliary variables, the nonconvex problems were transformed into convex optimization problems via the successive convex approximation and semidefinite relaxation, and then the approximate suboptimal solution of the original problem was obtained.The simulation results show that the proposed algorithm has good convergence performance and effectively improves the average data throughput of GU.…”
    Get full text
    Article
  8. 1268

    Light weight encryption technique: a cellular automaton based approach for securing health records by Shamama Anwar, Prashant Pranav, Supreeti Kamilya

    Published 2025-07-01
    “…The algorithm has been tested on some benchmark tests like the NIST test suite and Diehard test to show its efficacy.…”
    Get full text
    Article
  9. 1269

    CSL-SFNet for Cooperative Spectrum Sensing in Cognitive Satellite Network with GEO and LEO Satellites by Kai Yang, Shengbo Hu, Xin Zhang, Tingting Yan, Manqin Zhu

    Published 2024-01-01
    “…The simulation results demonstrate that the proposed algorithm can achieve a detection probability of 90% when the signal-to-noise ratio is −20 dB; it has a shorter running time and always outperforms the other CSS algorithms.…”
    Get full text
    Article
  10. 1270

    Inversion Study of Mechanical Parameters of Tunnel Surrounding Rock Based on Similar Test by Xianyun Wang, Hewei Cui, Hailiang Xu, Dong An, Yimin Song

    Published 2023-01-01
    “…Based on similar model tests and finite element simulations, inversion study of the mechanical parameters of the tunnel surrounding rock by combining artificial fish swarm algorithm (AFSA) and digital scattering correlation method is carried out. …”
    Get full text
    Article
  11. 1271

    Advancing Over-the-Air Federated Learning through Deep Reinforcement Learning in UAV-Assisted Networks with Movable Antennas by Mohsen Ahmadzadeh, Saeid Pakravan, Ghosheh Hodtani

    Published 2025-05-01
    “…Numerical results demonstrate that the proposed algorithm outperforms benchmarks such as Advantage Actor-Critic(A2C) and Soft Actor-Critic (SAC).…”
    Get full text
    Article
  12. 1272

    MATHEMATICAL MODEL AND DELAY TIME OF REFLECTED SIGNAL IN SYNTHETIC APERTURE SONAR by S. R. Heister, T. T. Tran

    Published 2019-06-01
    “…The model provides the algorithm design of direct synthesis of antenna aperture, which allows to obtain high resolution image of seabed surface in reverberation conditions. …”
    Get full text
    Article
  13. 1273

    System Verification and FPGA Implementation of Hardware Preemptive Scheduler for RISC-V Processor by Ionel Zagan, Vasile Gheorghita Gaitan

    Published 2025-01-01
    “…The overall purpose of this paper is to present the hardware scheduler accelerator (HwSA) concept based on the RISC-V 4-stage pipeline CPU, where the scheduling algorithm is implemented in hardware. The proposed system is compared with existing soft-core processors using different parameters, such as the field-programmable gate arrays (FPGA) resources used for implementation, frequency, instruction set architecture (ISA), scheduler type, and the number of pipeline stages. …”
    Get full text
    Article
  14. 1274

    SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training by Wanwei Huang, Haobin Tian, Lei Wang, Sunan Wang, Kun Wang, Songze Li

    Published 2025-07-01
    “…Next, the network intrusion detection process is modeled as a Markov decision process and integrated with the Soft Actor-Critic (SAC) reinforcement learning algorithm, with a view to constructing agents; In the context of adversarial training, two agents, designated as the attacker and the defender, are defined to perform asynchronous adversarial training. …”
    Get full text
    Article
  15. 1275
  16. 1276

    Unveiling insights from unstructured wealth: a comparative analysis of clustering techniques on blockchain cryptocurrency data by Ramzi A. Haraty, Salma Sobeh

    Published 2024-01-01
    “…This survey examines seven widely recognized clustering techniques, namely<em> k</em>-means, <em>G</em>-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and <em>k</em>-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and <em>k</em>-means clustering algorithm and compares them with a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
    Get full text
    Article
  17. 1277

    Multi-objective artificial-intelligence-based parameter tuning of antennas using variable-fidelity machine learning by Slawomir Koziel, Anna Pietrenko-Dabrowska, Stanislaw Szczepanski

    Published 2025-07-01
    “…Due to the reliance on computationally-expensive electromagnetic (EM) simulations, the use of conventional algorithms is prohibitive. These costs can be reduced by appropriate algorithmic tools involving surrogate modeling and soft computing methods. …”
    Get full text
    Article
  18. 1278

    Autonomous Dogfight Decision-Making for Air Combat Based on Reinforcement Learning with Automatic Opponent Sampling by Can Chen, Tao Song, Li Mo, Maolong Lv, Defu Lin

    Published 2025-03-01
    “…The training outcomes demonstrate that this improved PPO algorithm with an AOS framework outperforms existing reinforcement learning methods such as the soft actor–critic (SAC) algorithm and the PPO algorithm with prioritized fictitious self-play (PFSP). …”
    Get full text
    Article
  19. 1279

    Estimation of Vs30 and site classification of Bhaktapur district, Nepal using microtremor array measurement by Roshan Prajapati, Salim Dhonju, Subeg Man Bijukchhen, Michiko Shigefuji, Nobuo Takai

    Published 2024-10-01
    “…The elevated eastern and southeastern areas with high Vs30 were categorized as dense soil or soft rock, whereas the areas with low Vs30 that had suffered significant damage during the 2015 Gorkha earthquake were classified as soft soil sites. …”
    Get full text
    Article
  20. 1280

    Intelligent Reconfigurable surface technique for Multiple Antenna Communication System by Noor Qasim, Ismail Hburi, Haider Salih Al Ammar

    Published 2024-08-01
    “…For the reflecting element phase shift matrix the algorithm uses the arrival/departure angles of the LoS rays at the IRS elements. …”
    Get full text
    Article