-
121
-
122
Sensing-Aided Communication Method for Distributed Radar Communication System
Published 2025-05-01“…This paper proposes a dynamic power allocation scheme that, under the constraints of transmission power and detection probability, formulates power allocation as an optimization problem aimed at maximizing the system sum rate. …”
Get full text
Article -
123
Multi-Source, Fault-Tolerant, and Robust Navigation Method for Tightly Coupled GNSS/5G/IMU System
Published 2025-02-01“…This study introduces an advanced, tightly coupled GNSS/5G/IMU integration framework designed for distributed PNT systems, providing all-source fault detection with weighted, robust adaptive filtering. …”
Get full text
Article -
124
Toward Characterizing Dark Matter Subhalo Perturbations in Stellar Streams with Graph Neural Networks
Published 2025-01-01Get full text
Article -
125
Enhancing Safety in Autonomous Maritime Transportation Systems with Real-Time AI Agents
Published 2025-04-01“…We distinguish maritime AI agents from conventional systems by emphasizing their specialized functions, real-time processing demands, and resilience in dynamic environments. Key safety mechanisms—such as collision avoidance, anomaly detection, emergency coordination, and fail-safe operations—are analyzed to demonstrate how AI agents contribute to operational reliability. …”
Get full text
Article -
126
Bridge Damage Localization Through Response Reconstruction with Multiple BP-ANNs Under Vehicular Loading
Published 2024-11-01“…Damage detection is a critical aspect of bridge health monitoring. …”
Get full text
Article -
127
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
Published 2025-03-01“…The increasing prevalence of cyber threats in wireless sensor networks (WSNs) necessitates adaptive and efficient security mechanisms to ensure robust data transmission while addressing resource constraints. This paper proposes a reinforcement learning-based adaptive encryption framework that dynamically scales encryption levels based on real-time network conditions and threat classification. …”
Get full text
Article -
128
Perception-Based H.264/AVC Video Coding for Resource-Constrained and Low-Bit-Rate Applications
Published 2025-07-01“…To this end, macroblocks (MBs) containing human faces are detected using the Viola–Jones algorithm, which leverages AdaBoost for feature selection and a cascade of classifiers for fast and accurate detection. …”
Get full text
Article -
129
Conditional diffusion-generated super-resolution for myocardial perfusion MRI
Published 2025-01-01“…Achieving broader slice coverage and higher temporal resolution is essential for accurately detecting abnormalities across different slice locations but remains difficult due to constraints in acquisition speed and heart rate variability. …”
Get full text
Article -
130
Three-Dimensional Minute-Scale Displacement of Fels Slide Measured With Multistation <italic>Ku</italic>-Band Ground-Based Radar
Published 2025-01-01“…After geocoding, the corrected LOS deformations from the two stations were combined with an additional motion direction constraint from repeat light detection and ranging measurements over a longer two-year period to invert three-dimensional motion vectors. …”
Get full text
Article -
131
Cost-Effective Resilience: A Comprehensive Survey and Tutorial on Assessing Open-Source Cybersecurity Tools for Multi-Tiered Defense
Published 2024-01-01“…We propose a novel six-layered model that integrates these tools into a cohesive strategy, covering detection and prevention, endpoint protection, investigation and recovery, SIEM, IAM, and security awareness and training. …”
Get full text
Article -
132
A 22 Billion M⊙ Black Hole in Holmberg 15A with Keck KCWI Spectroscopy and Triaxial Orbit Modeling
Published 2025-01-01Get full text
Article -
133
Development of an integrated engineering education model using multi-body closed system modeling, computational analysis, and signal processing analysis
Published 2025-01-01“…Additionally, the prediction model, Prophet (developed by Facebook), is incorporated to aid in the development of mechanical products from a hardware perspective, such as simple strength and dynamic characteristics analysis. This is achieved by establishing a user-defined periodic model for unique periodic signals, efficiently processing accumulated data, reviewing reliability based on the difference between the prediction model and actual data, and proposing abnormality detection methods. …”
Get full text
Article -
134
High-Precision Pose Measurement of Containers on the Transfer Platform of the Dual-Trolley Quayside Container Crane Based on Machine Vision
Published 2025-04-01“…A multi-scale adaptive frequency object-detection framework is developed based on YOLO11, achieving improved detection accuracy for multi-scale lockhole keypoints in perspective-distortion scenarios (mAP@0.5 reaches 95.1%, 4.7% higher than baseline models) through dynamic balancing of high–low-frequency features and adaptive convolution kernel adjustments. …”
Get full text
Article -
135
A Novel Method for Automatic Extrinsic Parameter Calibration of RGB-D Cameras
Published 2021-01-01Get full text
Article -
136
A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions
Published 2025-07-01“…Leveraging the inherent dynamic game-theoretic characteristics of covert communication (CC) systems, we propose a novel covert communication optimization algorithm based on generative adversarial networks (GAN-CCs) to achieve system-wide optimization under the constraint of maximum detection error probability. …”
Get full text
Article -
137
CraftFuzz: Generating Precise Requests for PHP Web Vulnerability Validation
Published 2025-02-01“…In contrast, dynamic analysis can generate accurate vulnerability reports. …”
Get full text
Article -
138
SCH-Hunter: A Taint-Based Hybrid Fuzzing Framework for Smart Contract Honeypots
Published 2025-05-01“…A symbolic execution module is also introduced to resolve complex conditional branches that fuzzing alone fails to penetrate, enabling constraint solving. Furthermore, real-time dynamic taint propagation monitoring is implemented using taint analysis techniques, leveraging taint flow information to optimize seed mutation processes, thereby directing mutation resources toward high-value code regions. …”
Get full text
Article -
139
Fusion Ranging Method of Monocular Camera and Millimeter-Wave Radar Based on Improved Extended Kalman Filtering
Published 2025-05-01“…Initially, a monocular ranging model was constructed based on object detection algorithms. Subsequently, the pixel-distance joint dual-constraint matching algorithm is employed to accomplish cross-modal matching between the MMW radar and the monocular camera. …”
Get full text
Article -
140
UAV-IRS Assisted Full-Duplex Covert Communication: Joint Optimization of Phase Shift and 3D Trajectory
Published 2025-01-01“…As a full-duplex receiver, David actively generates dynamic artificial noise (AN) to deceive the warden (Eve) and obscure her detection capability. …”
Get full text
Article