-
1021
-
1022
Automated process for analyzing 2D CAD floor plan drawings and generating FloorspaceJS-compatible space objects for building energy simulations
Published 2025-06-01“…This paper attempts to extract geometric data from existing 2D floor plan drawings and then proposes an algorithm to identify all faces enclosed by simple closed curves on the drawings. …”
Get full text
Article -
1023
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
Published 2022-12-01Get full text
Article -
1024
-
1025
-
1026
Model-Based Adaptive Iterative Hard Thresholding Compressive Sensing in Sensor Network for Volcanic Earthquake Detection
Published 2015-07-01“…Firstly, a sparse measurement matrix with theoretical analysis of its restricted isometry property (RIP) is designed to simplify the acquisition process, thereby reducing required storage space and computational demands in sensors. Secondly, a compressive sensing reconstruction algorithm with theoretical analysis of its error bound is presented. …”
Get full text
Article -
1027
Transformers—Messages in disguise
Published 2025-06-01“…Compared to human-designed algorithms, Neural Network (NN)-based cryptography can create a new NN-specific cryptographic scheme that changes every time the NN is (re)trained. …”
Get full text
Article -
1028
Reliability Assessment via Combining Data from Similar Systems
Published 2025-05-01“…In operational testing contexts, testers face dual challenges of constrained timeframes and limited resources, both of which impede the generation of reliability test data. …”
Get full text
Article -
1029
Quadrature based innovative techniques concerning nonlinear equations having unknown multiplicity
Published 2024-12-01“…The significance of iterative algorithms executed by computers in resolving such functions is of paramount importance and undeniable in contemporary times. …”
Get full text
Article -
1030
Implementation of Associated Hermite FDTD Method in Handling INBCs for Shielding Analysis
Published 2016-01-01“…The two-port network equations of INBCs in frequency domain are transformed into AH domain to represent the relationship of tangential components of the electric and magnetic fields at faces of the shield. The established AH-INBCs shielding boundaries are incorporated into a set of implicit equations to calculate the expansion coefficients vectors of electromagnetic fields in the computational domain. …”
Get full text
Article -
1031
Review: the application of deep reinforcement learning to quantitative trading in financial market
Published 2024-12-01“…It is believed that with the continuous optimization of algorithms and the improvement of computing power, DRL will play a more important role in the field of quantitative trading in financial market, providing more accurate and reliable support for investment decisions.…”
Get full text
Article -
1032
Research on Resource Reservation Strategy for Edge Federation
Published 2025-01-01“…With the increasing number of users and the continuous expansion of task scales, the resource constraints faced by edge computing are becoming increasingly pronounced. …”
Get full text
Article -
1033
Prescribed‐time resilient current‐sensorless DC power converter control
Published 2024-11-01Get full text
Article -
1034
AIME-solve: Accessible interactive mathematical expressions solver for optimized learning and visual empowerment
Published 2025-05-01“…However, students with visual disabilities still face significant challenges in mathematics learning, such as real-time feedback, error correction, step-by-step guidance, and interactive learning using digital devices such as smartphones and computers. …”
Get full text
Article -
1035
-
1036
Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing
Published 2025-05-01“…However, with the advent of large-scale quantum computing, traditional cryptographic mechanisms used in blockchain systems face potential vulnerabilities due to Shor’s algorithm, which threatens widely adopted public key cryptographic schemes. …”
Get full text
Article -
1037
The System Research and Implementation for Autorecognition of the Ship Draft via the UAV
Published 2021-01-01“…In order to solve the above problems, this paper introduces the computer image processing technology based on deep learning, and the specific process is divided into three steps: first, the video sampling is carried out by the UAV to obtain a large number of pictures of the ship draft reading face, and the images are preprocessed; then, the deep learning target detection algorithm of improved YOLOv3 is used to process the images to predict the position of the waterline and identify the draft characters; finally, the prediction results are analyzed and processed to obtain the final reading results. …”
Get full text
Article -
1038
A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication
Published 2025-05-01“…However, due to the open nature of wireless communications, such applications face security threats posed by UAV authentication, especially in scalable IoT environments. …”
Get full text
Article -
1039
Resource Allocation and Interference Coordination Strategies in Heterogeneous Dual-Layer Satellite Networks
Published 2025-02-01“…In the face of rapidly evolving communication technologies and increasing user demands, traditional terrestrial networks are challenged by the need for high-quality, high-speed, and reliable communication. …”
Get full text
Article -
1040
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…Identity authentication is the basis for ensuring the security of the Internet of things. However, in the face of quantum attacks due to the large number of nodes in the Internet of things, the signcrypt-based identity authentication scheme will consume a lot of resources to generate node keys, which is difficult to meet the low cost requirements of the Internet of things. …”
Get full text
Article