-
1261
SDN Controller Selection and Secure Resource Allocation
Published 2025-01-01“…Here, user registration, load balancing, attack detection, controller selection, and resource allocation phases are included. Utilizing XOR Left Shift (XORLS), the user details are secured by IP traceback and hash codes are generated using the Mid Square-based KECCAK 512 (MS-KECCAK 512) algorithm. …”
Get full text
Article -
1262
-
1263
Control strategy of robotic manipulator based on multi-task reinforcement learning
Published 2025-02-01“…To tackle this issue, instead of uniform parameter sharing, we propose an adjudicate reconfiguration network model, which we integrate into the Soft Actor-Critic (SAC) algorithm to address the optimization problems brought about by parameter sharing in multi-task reinforcement learning algorithms. …”
Get full text
Article -
1264
GSB: GNGS and SAG-BiGRU network for malware dynamic detection.
Published 2024-01-01“…For solving the problem, this study proposed the GNGS algorithm to construct a new balance dataset for the model algorithm to pay more attention to the feature learning of the minority attacks' malware to improve the detection rate of attacks' malware. …”
Get full text
Article -
1265
Advanced day-ahead scheduling of HVAC demand response control using novel strategy of Q-learning, model predictive control, and input convex neural networks
Published 2025-05-01“…As a novel RL approach, the proposed algorithm generates day-ahead HVAC demand response (DR) signals in smart homes that optimally reduce and/or shift peak energy usage, reduce electricity costs, minimize user discomfort, and honor in a best-effort way the recommendations from utility/aggregator, which in turn has impact on the overall well being of the distribution network controlled by the aggregator. …”
Get full text
Article -
1266
Computational Adaptive Optics for HAR Hybrid Trench Array Topography Measurement by Utilizing Coherence Scanning Interferometry
Published 2025-06-01“…Here, we propose a computational aberration correction method for measuring the topography of the HAR structure by the particle swarm optimization (PSO) algorithm without constructing a database and prior knowledge, and a phase filter in the spatial frequency domain is constructed to restore interference signals distorted by shift-variant aberrations. …”
Get full text
Article -
1267
Computation offloading scheme for RIS-empowered UAV edge network
Published 2022-10-01“…In order to address the challenge of low offloading rate caused by the obstacles blocking in the links between unmanned aerial vehicle (UAV) and ground users (GU) in urban scene, a partial task offloading scheme for UAV-enabled mobile edge computing with the aid of reconfigurable intelligence surface was proposed.A nonconvex and multivariable coupling stochastic optimization problem was formulated by the joint design of the computation task allocation, the transmit power of GU, the phase shift of RIS, UAV computation resource, and UAV trajectory, aiming at maximizing the minimum average data throughput of GU.By leveraging the properties of mathematical expectation, the stochastic optimization problem was transformed into a deterministic optimization problem.Then, the deterministic optimization problem was decomposed into three subproblems by using the block coordinate descent (BCD) algorithm.By introducing auxiliary variables, the nonconvex problems were transformed into convex optimization problems via the successive convex approximation and semidefinite relaxation, and then the approximate suboptimal solution of the original problem was obtained.The simulation results show that the proposed algorithm has good convergence performance and effectively improves the average data throughput of GU.…”
Get full text
Article -
1268
Light weight encryption technique: a cellular automaton based approach for securing health records
Published 2025-07-01“…The algorithm has been tested on some benchmark tests like the NIST test suite and Diehard test to show its efficacy.…”
Get full text
Article -
1269
CSL-SFNet for Cooperative Spectrum Sensing in Cognitive Satellite Network with GEO and LEO Satellites
Published 2024-01-01“…The simulation results demonstrate that the proposed algorithm can achieve a detection probability of 90% when the signal-to-noise ratio is −20 dB; it has a shorter running time and always outperforms the other CSS algorithms.…”
Get full text
Article -
1270
Inversion Study of Mechanical Parameters of Tunnel Surrounding Rock Based on Similar Test
Published 2023-01-01“…Based on similar model tests and finite element simulations, inversion study of the mechanical parameters of the tunnel surrounding rock by combining artificial fish swarm algorithm (AFSA) and digital scattering correlation method is carried out. …”
Get full text
Article -
1271
Advancing Over-the-Air Federated Learning through Deep Reinforcement Learning in UAV-Assisted Networks with Movable Antennas
Published 2025-05-01“…Numerical results demonstrate that the proposed algorithm outperforms benchmarks such as Advantage Actor-Critic(A2C) and Soft Actor-Critic (SAC).…”
Get full text
Article -
1272
MATHEMATICAL MODEL AND DELAY TIME OF REFLECTED SIGNAL IN SYNTHETIC APERTURE SONAR
Published 2019-06-01“…The model provides the algorithm design of direct synthesis of antenna aperture, which allows to obtain high resolution image of seabed surface in reverberation conditions. …”
Get full text
Article -
1273
System Verification and FPGA Implementation of Hardware Preemptive Scheduler for RISC-V Processor
Published 2025-01-01“…The overall purpose of this paper is to present the hardware scheduler accelerator (HwSA) concept based on the RISC-V 4-stage pipeline CPU, where the scheduling algorithm is implemented in hardware. The proposed system is compared with existing soft-core processors using different parameters, such as the field-programmable gate arrays (FPGA) resources used for implementation, frequency, instruction set architecture (ISA), scheduler type, and the number of pipeline stages. …”
Get full text
Article -
1274
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…Next, the network intrusion detection process is modeled as a Markov decision process and integrated with the Soft Actor-Critic (SAC) reinforcement learning algorithm, with a view to constructing agents; In the context of adversarial training, two agents, designated as the attacker and the defender, are defined to perform asynchronous adversarial training. …”
Get full text
Article -
1275
-
1276
Unveiling insights from unstructured wealth: a comparative analysis of clustering techniques on blockchain cryptocurrency data
Published 2024-01-01“…This survey examines seven widely recognized clustering techniques, namely<em> k</em>-means, <em>G</em>-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and <em>k</em>-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and <em>k</em>-means clustering algorithm and compares them with a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
Get full text
Article -
1277
Multi-objective artificial-intelligence-based parameter tuning of antennas using variable-fidelity machine learning
Published 2025-07-01“…Due to the reliance on computationally-expensive electromagnetic (EM) simulations, the use of conventional algorithms is prohibitive. These costs can be reduced by appropriate algorithmic tools involving surrogate modeling and soft computing methods. …”
Get full text
Article -
1278
Autonomous Dogfight Decision-Making for Air Combat Based on Reinforcement Learning with Automatic Opponent Sampling
Published 2025-03-01“…The training outcomes demonstrate that this improved PPO algorithm with an AOS framework outperforms existing reinforcement learning methods such as the soft actor–critic (SAC) algorithm and the PPO algorithm with prioritized fictitious self-play (PFSP). …”
Get full text
Article -
1279
Estimation of Vs30 and site classification of Bhaktapur district, Nepal using microtremor array measurement
Published 2024-10-01“…The elevated eastern and southeastern areas with high Vs30 were categorized as dense soil or soft rock, whereas the areas with low Vs30 that had suffered significant damage during the 2015 Gorkha earthquake were classified as soft soil sites. …”
Get full text
Article -
1280
Intelligent Reconfigurable surface technique for Multiple Antenna Communication System
Published 2024-08-01“…For the reflecting element phase shift matrix the algorithm uses the arrival/departure angles of the LoS rays at the IRS elements. …”
Get full text
Article