-
101
Enhancing Diversity and Convergence in MMOPs with a Gaussian Similarity-Based Evolutionary Algorithm
Published 2025-01-01“…Multi-modal multi-objective optimization problems (MMOPs) are challenging due to multiple solutions sharing similar objective values. Existing algorithms for solving MMOPs typically evaluate the crowding in the decision space and objective space independently, leading to an imbalance in diversity between the two spaces. …”
Get full text
Article -
102
Intelligent Detection Algorithm for Concrete Bridge Defects Based on SATH–YOLO Model
Published 2025-02-01Get full text
Article -
103
A Federated Learning Algorithm That Combines DCScaffold and Differential Privacy for Load Prediction
Published 2025-03-01“…Experimental results demonstrate that the proposed algorithm enables federated training without the need for sharing raw load data, facilitating load scheduling and energy management operations in smart grids while safeguarding user privacy. …”
Get full text
Article -
104
Intrusion detection algorithm of wireless network based on network traffic anomaly analysis
Published 2025-06-01“…To promptly identify and mitigate abnormal behaviors while ensuring normal operation and security, this paper proposes an algorithm for detecting compromised nodes in wireless networks based on network traffic anomaly analysis. …”
Get full text
Article -
105
LE-YOLO: A Lightweight and Enhanced Algorithm for Detecting Surface Defects on Particleboard
Published 2025-07-01“…A dynamic mixed convolutional network module is introduced to construct a lightweight backbone architecture. Moreover, the Shared Dilated Feature Pyramid (SDFP) module is employed in the neck network, effectively reducing computational overhead while preserving detection accuracy. …”
Get full text
Article -
106
Algorithms to Identify Copied and Manipulated Spectrum Occupancy Data in Cognitive Radio Networks
Published 2025-01-01“…Spectrum Access Systems (SASs) and similar systems coordinate access to shared radio frequency bands to efficiently allocate the use of spectrum between users in a locality. …”
Get full text
Article -
107
RTL-Net: real-time lightweight Urban traffic object detection algorithm
Published 2025-05-01“…Secondly, the Lightweight Shared Convolutional Detection (LSCD) head was replaced to ensure the detection performance and significantly improve the lightweight performance of the algorithm. …”
Get full text
Article -
108
SACWOM: Synergistic Adaptive Congestion Window Optimization Mechanism for Self-Clocked Algorithm
Published 2025-01-01“…Congestion Control (CC) is essential in networked systems, especially in environments with strict delay and throughput requirements. While CC algorithms like Self-Clocked Rate Adaptation for Multimedia (SCReAM) and Bottleneck Bandwidth and Round-trip propagation time (BBR) have shown progress, each faces limitations: BBR encounters difficulty in balancing responsiveness and fairness when rapid fluctuations in network conditions arise, which can lead to inefficient performance in shared environments. …”
Get full text
Article -
109
Design and Application of Algorithm Intensive Environment for CMA Big Data and Cloud Platform
Published 2024-01-01“…The algorithm library facilitates the standardization, unified management and sharing of algorithms. …”
Get full text
Article -
110
Deep reinforcement learning-based resource reservation algorithm for emergency Internet-of-things slice
Published 2020-09-01“…Based on the requirements of ultra-low latency services for emergency Internet-of-things (EIoT) applications,a multi-slice network architecture for ultra-low latency emergency IoT was designed,and a general methodology framework based on resource reservation,sharing and isolation for multiple slices was proposed.In the proposed framework,real-time and automatic inter-slice resource demand prediction and allocation were realized based on deep reinforcement learning (DRL),while intra-slice user resource allocation was modeled as a shape-based 2-dimension packing problem and solved with a heuristic numerical algorithm,so that intra-slice resource customization was achieved.Simulation results show that the resource reservation-based method enable EIoT slices to explicitly reserve resources,provide a better security isolation level,and DRL could guarantee accuracy and real-time updates of resource reservations.Compared with four existing algorithms,dueling deep Q-network (DQN) performes better than the benchmarks.…”
Get full text
Article -
111
A lightweight UAV target detection algorithm based on improved YOLOv8s model
Published 2025-05-01“…To tackle these challenges, this paper proposes LW-YOLOv8, a lightweight object detection algorithm based on the YOLOv8s model for UAV deployment. …”
Get full text
Article -
112
A Lightweight Pavement Defect Detection Algorithm Integrating Perception Enhancement and Feature Optimization
Published 2025-07-01“…Secondly, the dynamic upsampling module DySample is introduced into the efficient feature pyramid, constructing a new feature fusion pyramid (Generalized Dynamic Sampling Feature Pyramid Network, GDSFPN) to optimize the multi-scale feature fusion effect. In addition, a shared detail-enhanced convolution lightweight detection head (SDCLD) was designed, which significantly reduces the model’s parameters and computation while improving localization and classification performance. …”
Get full text
Article -
113
Traffic environment perception algorithm based on multi-task feature fusion and orthogonal attention
Published 2025-06-01“…In the realm of autonomous driving, the design and implementation of collaborative multi-task perception algorithms pose significant challenges. These challenges are primarily rooted in the need for real-time processing speeds, effective feature sharing among diverse tasks, and seamless information fusion. …”
Get full text
Article -
114
Integrated energy microgrid bi-level game scheduling optimization taking into account electricity-heat-hydrogen enriched compressed natural gas coupling and shared energy storage
Published 2025-08-01“…Additionally, tiered carbon trading mechanisms, integrated demand response strategies, and shared energy storage are introduced to optimize carbon reduction on both the demand and storage sides while effectively constraining energy emissions. …”
Get full text
Article -
115
A Two-Phase Embedding Approach for Secure Distributed Steganography
Published 2025-02-01“…The algorithm effectively reduces key management complexity while enhancing resilience against sophisticated steganalytic attacks. …”
Get full text
Article -
116
MetaboLINK is a novel algorithm for unveiling cell-specific metabolic pathways in longitudinal datasets
Published 2025-01-01“…This method is designed to reduce the dimensionality of large datasets while preserving significant variance. For the first time, we applied the PCA-GLASSO algorithm (i.e., MetaboLINK) to metabolomics data derived from Nuclear Magnetic Resonance (NMR) spectroscopy performed on neural cells at various developmental stages, from human embryonic stem cells to neurons.ResultsThe MetaboLINK analysis of longitudinal metabolomics data has revealed distinct pathways related to amino acids, lipids, and energy metabolism, uniquely associated with specific cell progenies. …”
Get full text
Article -
117
LH-YOLO: A Lightweight and High-Precision SAR Ship Detection Model Based on the Improved YOLOv8n
Published 2024-11-01“…Additionally, a reused and shared convolutional detection (RSCD) head is designed using a weight sharing mechanism. …”
Get full text
Article -
118
APPLICATION OF QUADRATIC PROGRAMMING ON PORTFOLIO OPTIMIZATION USING WOLFE’S METHOD AND PARTICLE SWARM OPTIMIZATION ALGORITHM
Published 2024-05-01“…Based on the result, using Wolfe’s method, the ASII and ITMG stock portfolios are obtained, namely the optimal proportion of ASII shares = 0.76401 or 76.401% and ITMG shares = 0.23598 or 23.598%, while the PSO algorithm obtains a portfolio of ASII and ITMG shares, namely ASII shares = 75.02% and ITMG shares = 24.98%. …”
Get full text
Article -
119
EfficientNet-b0-Based 3D Quantification Algorithm for Rectangular Defects in Pipelines
Published 2025-01-01“…The network uses the EfficientNet structure for feature extraction, while the training and validation process utilizes the PyTorch Lightning framework. …”
Get full text
Article -
120
Optimising islanded AC microgrid control: A hierarchical approach with FCS-VMPC and consensus algorithm
Published 2025-03-01“…The primary layer is typically implemented using a linear controller, while the secondary control relies on complex control strategies. …”
Get full text
Article