Search alternatives:
constraint » constraints (Expand Search)
Showing 121 - 140 results of 245 for search 'Dynamic constraint detection', query time: 0.11s Refine Results
  1. 121
  2. 122

    Sensing-Aided Communication Method for Distributed Radar Communication System by Xinren Wang, Sisi Xia, Zhongzheng Ding, Qin Wang, Wenchao Xia, Haitao Zhao

    Published 2025-05-01
    “…This paper proposes a dynamic power allocation scheme that, under the constraints of transmission power and detection probability, formulates power allocation as an optimization problem aimed at maximizing the system sum rate. …”
    Get full text
    Article
  3. 123

    Multi-Source, Fault-Tolerant, and Robust Navigation Method for Tightly Coupled GNSS/5G/IMU System by Zhongliang Deng, Zhichao Zhang, Zhenke Ding, Bingxun Liu

    Published 2025-02-01
    “…This study introduces an advanced, tightly coupled GNSS/5G/IMU integration framework designed for distributed PNT systems, providing all-source fault detection with weighted, robust adaptive filtering. …”
    Get full text
    Article
  4. 124
  5. 125

    Enhancing Safety in Autonomous Maritime Transportation Systems with Real-Time AI Agents by Irmina Durlik, Tymoteusz Miller, Ewelina Kostecka, Polina Kozlovska, Wojciech Ślączka

    Published 2025-04-01
    “…We distinguish maritime AI agents from conventional systems by emphasizing their specialized functions, real-time processing demands, and resilience in dynamic environments. Key safety mechanisms—such as collision avoidance, anomaly detection, emergency coordination, and fail-safe operations—are analyzed to demonstrate how AI agents contribute to operational reliability. …”
    Get full text
    Article
  6. 126

    Bridge Damage Localization Through Response Reconstruction with Multiple BP-ANNs Under Vehicular Loading by Xuzhao Lu, Chenxi Wei, Limin Sun, Wei Zhang

    Published 2024-11-01
    “…Damage detection is a critical aspect of bridge health monitoring. …”
    Get full text
    Article
  7. 127

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…The increasing prevalence of cyber threats in wireless sensor networks (WSNs) necessitates adaptive and efficient security mechanisms to ensure robust data transmission while addressing resource constraints. This paper proposes a reinforcement learning-based adaptive encryption framework that dynamically scales encryption levels based on real-time network conditions and threat classification. …”
    Get full text
    Article
  8. 128

    Perception-Based H.264/AVC Video Coding for Resource-Constrained and Low-Bit-Rate Applications by Lih-Jen Kau, Chin-Kun Tseng, Ming-Xian Lee

    Published 2025-07-01
    “…To this end, macroblocks (MBs) containing human faces are detected using the Viola–Jones algorithm, which leverages AdaBoost for feature selection and a cascade of classifiers for fast and accurate detection. …”
    Get full text
    Article
  9. 129

    Conditional diffusion-generated super-resolution for myocardial perfusion MRI by Changyu Sun, Changyu Sun, Neha Goyal, Yu Wang, Darla L. Tharp, Senthil Kumar, Talissa A. Altes

    Published 2025-01-01
    “…Achieving broader slice coverage and higher temporal resolution is essential for accurately detecting abnormalities across different slice locations but remains difficult due to constraints in acquisition speed and heart rate variability. …”
    Get full text
    Article
  10. 130

    Three-Dimensional Minute-Scale Displacement of Fels Slide Measured With Multistation <italic>Ku</italic>-Band Ground-Based Radar by Farnoush Hosseini, Bernhard Rabus, Franz J. Meyer, Davide Donati, Doug Stead, John J. Clague

    Published 2025-01-01
    “…After geocoding, the corrected LOS deformations from the two stations were combined with an additional motion direction constraint from repeat light detection and ranging measurements over a longer two-year period to invert three-dimensional motion vectors. …”
    Get full text
    Article
  11. 131

    Cost-Effective Resilience: A Comprehensive Survey and Tutorial on Assessing Open-Source Cybersecurity Tools for Multi-Tiered Defense by Hassan Jalil Hadi, Naveed Ahmad, Kamran Aziz, Yue Cao, Mohammed Ali Alshara

    Published 2024-01-01
    “…We propose a novel six-layered model that integrates these tools into a cohesive strategy, covering detection and prevention, endpoint protection, investigation and recovery, SIEM, IAM, and security awareness and training. …”
    Get full text
    Article
  12. 132
  13. 133

    Development of an integrated engineering education model using multi-body closed system modeling, computational analysis, and signal processing analysis by Park Yonghu

    Published 2025-01-01
    “…Additionally, the prediction model, Prophet (developed by Facebook), is incorporated to aid in the development of mechanical products from a hardware perspective, such as simple strength and dynamic characteristics analysis. This is achieved by establishing a user-defined periodic model for unique periodic signals, efficiently processing accumulated data, reviewing reliability based on the difference between the prediction model and actual data, and proposing abnormality detection methods. …”
    Get full text
    Article
  14. 134

    High-Precision Pose Measurement of Containers on the Transfer Platform of the Dual-Trolley Quayside Container Crane Based on Machine Vision by Jiaqi Wang, Mengjie He, Yujie Zhang, Zhiwei Zhang, Octavian Postolache, Chao Mi

    Published 2025-04-01
    “…A multi-scale adaptive frequency object-detection framework is developed based on YOLO11, achieving improved detection accuracy for multi-scale lockhole keypoints in perspective-distortion scenarios (mAP@0.5 reaches 95.1%, 4.7% higher than baseline models) through dynamic balancing of high–low-frequency features and adaptive convolution kernel adjustments. …”
    Get full text
    Article
  15. 135
  16. 136

    A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions by Wenxuan Fu, Bo Li, Haipeng Wang, Haochen Gong, Xiang Lin

    Published 2025-07-01
    “…Leveraging the inherent dynamic game-theoretic characteristics of covert communication (CC) systems, we propose a novel covert communication optimization algorithm based on generative adversarial networks (GAN-CCs) to achieve system-wide optimization under the constraint of maximum detection error probability. …”
    Get full text
    Article
  17. 137

    CraftFuzz: Generating Precise Requests for PHP Web Vulnerability Validation by Jiazhen Zhao, Kailong Zhu, Guozheng Yang, Yifan Zhang, Yuliang Lu

    Published 2025-02-01
    “…In contrast, dynamic analysis can generate accurate vulnerability reports. …”
    Get full text
    Article
  18. 138

    SCH-Hunter: A Taint-Based Hybrid Fuzzing Framework for Smart Contract Honeypots by Haoyu Zhang, Baotong Wang, Wenhao Fu, Leyi Shi

    Published 2025-05-01
    “…A symbolic execution module is also introduced to resolve complex conditional branches that fuzzing alone fails to penetrate, enabling constraint solving. Furthermore, real-time dynamic taint propagation monitoring is implemented using taint analysis techniques, leveraging taint flow information to optimize seed mutation processes, thereby directing mutation resources toward high-value code regions. …”
    Get full text
    Article
  19. 139

    Fusion Ranging Method of Monocular Camera and Millimeter-Wave Radar Based on Improved Extended Kalman Filtering by Ye Chen, Qirui Cui, Shungeng Wang

    Published 2025-05-01
    “…Initially, a monocular ranging model was constructed based on object detection algorithms. Subsequently, the pixel-distance joint dual-constraint matching algorithm is employed to accomplish cross-modal matching between the MMW radar and the monocular camera. …”
    Get full text
    Article
  20. 140

    UAV-IRS Assisted Full-Duplex Covert Communication: Joint Optimization of Phase Shift and 3D Trajectory by Pengwu Wan, Xiaolin Dong, Dongrui Chen, Xi Hui, Jin Wang

    Published 2025-01-01
    “…As a full-duplex receiver, David actively generates dynamic artificial noise (AN) to deceive the warden (Eve) and obscure her detection capability. …”
    Get full text
    Article