-
11461
Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing
Published 2023-09-01“…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
Get full text
Article -
11462
ANN Approach to Predict the Flow Stress of CMn (Nb-Ti-V) Micro Alloyed Steel
Published 2019-07-01“…The ANN model was trained with Levenberg-Marquardt (LM) algorithm. The optimal LM neural network model with two hidden layer network with ten neurons in the ?…”
Get full text
Article -
11463
A Novel Feature Extraction Technique Using Binarization of Bit Planes for Content Based Image Classification
Published 2014-01-01“…The technique has binarized the significant bit planes of an image by selecting local thresholds. The proposed algorithm has been tested on a public dataset and has been compared with existing widely used techniques using binarization for extraction of features. …”
Get full text
Article -
11464
Design of PI Controller for Voltage Controller of Four-Phase Interleaved Boost Converter Using Particle Swarm Optimization
Published 2020-01-01“…The metaheuristic optimizations, particle swarm optimization (PSO), genetic algorithm (GA), and Tabu search (TS) are applied to find the optimal gains for the proposed control system. …”
Get full text
Article -
11465
Gait Correlation Analysis Based Human Identification
Published 2014-01-01“…By background subtracting algorithm, the moving silhouette figure can be extracted from the walking images sequence. …”
Get full text
Article -
11466
INTER-LAYER BIT ALLOCATION FOR SCALABLE HIGH-EFFICIENCY VIDEO CODING
Published 2016-06-01“…In this paper, an improved bit allocation algorithm is proposed at the frame level for the emerging Scalable High-efficiency Video Coding (SHVC) standard. …”
Get full text
Article -
11467
AXIAL TENSILE STRENGTH ANALYSIS OF UNBONDED FLEXIBLE PIPE CONTAINING COMPOSITE TENSILE ARMORS
Published 2020-01-01“…As offshore oil industry moves into ultra-deep water,replacing the steel tensile armors of unbonded flexible pipe with composite is becoming a scheme that can effectively reduce weight and provide better mechanical properties.The anisotropic parameters of composite are obtained by meso-mechanical method,then a model of axisymmetric structure response for composite flexible pipe with composite armored layer is established,which is based on both thick-wall cylinder theory and the differential equation of curved beam,and also the algorithm of cyclic iterative is combined.Failure models of different type of flexible pipes are obtained,and iso-strength method is used for composite armored pipe.A case study shows that composite armors can effectively enhance the tensile strength of unbonded flexible pipe while effectively reduce the overall weight.Results state that volume fraction,elastic modulus and strength of fiber are the important parameters which affect the axial stiffness and tensile strength of unbonded flexible pipe.…”
Get full text
Article -
11468
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
Get full text
Article -
11469
An Improved AAM Method for Extracting Human Facial Features
Published 2012-01-01“…Experimental results show that the improved algorithm can increase the accuracy of the AAM fitting and express more information for structures of edge and texture.…”
Get full text
Article -
11470
Leading causes of fever in patients with liver function disorders
Published 2010-02-01“…Article presents pathophysiological mechanisms of development of fever. The algorithm of assessment of patient with disorder of liver function and fever is submitted.Original positions. …”
Get full text
Article -
11471
Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis
Published 2019-07-01“…The performances of involved important factors, such as wavelet basis, overcomplete dictionaries, and the reconstruction algorithms, are comparatively illustrated, with the purpose to give data reference for practical applications. …”
Get full text
Article -
11472
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Published 2014-01-01“…The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. …”
Get full text
Article -
11473
Segment search for local extremums of images based on the analysis of brightness of adjacent homogeneous areas
Published 2019-09-01“…Well-known block-search algorithms provide high speed, but they extract only strict (single-pixel) extremes, skipping extreme areas formed by non-strict extremes. …”
Get full text
Article -
11474
Multilevel Thresholding for Image Segmentation Using Mean Gradient
Published 2022-01-01“…These challenges present difficulties in the choice of the algorithm to use, and sometimes, it is practically impossible to implement these algorithms in a low-capacity hardware application where computational power and memory utilization are of great concern. …”
Get full text
Article -
11475
A Stochastic and Optimized Energy Efficient Clustering Protocol for Wireless Sensor Networks
Published 2014-03-01“…The performance of the proposed scheme is compared with the clustering-based routing protocols, Low-Energy Adaptive Clustering Hierarchy (LEACH), LEACH-Centralized (LEACH-C), and Adaptive and Energy Efficient Clustering (AEEC) algorithm. Simulation results show that it significantly reduces energy consumption and improves network lifetime. …”
Get full text
Article -
11476
Solution of Linear Radiative Transfer Equation in Hollow Sphere by Diamond Difference Discrete Ordinates and Decomposition Methods
Published 2024-12-01“…We use a decomposition method based on the Adomian formulations, together with a diamond difference scheme and a trapezoidal rule to approximate the integral part of the solution. The algorithm is simple, highly reproducible, and can be easily adapted to further problems or geometries. …”
Get full text
Article -
11477
Strength Analysis for Cage of Planetary Wheel Needle Roller Bearing
Published 2021-12-01“…Aiming to solving the problem of cage failure under revolution-rotation,based on the dynamics theory of rolling bearing,the dynamics differential equations of needle roller bearing coupled with revolution-rotation working condition are established,and GSTIFF variable step length integral algorithm is adopted to solve the bearing. Cage stress is used to evaluate cage strength,and the influence of bearing working conditions on cage stress is studied to guide cage material selection. …”
Get full text
Article -
11478
Communication-efficient federated learning method via redundant data elimination
Published 2023-05-01“…To address the influence of limited network bandwidth of edge devices on the communication efficiency of federated learning, and efficiently transmit local model update to complete model aggregation, a communication-efficient federated learning method via redundant data elimination was proposed.The essential reasons for generation of redundant update parameters and according to non-IID properties and model distributed training features of FL were analyzed, a novel sensitivity and loss function tolerance definitions for coreset was given, and a novel federated coreset construction algorithm was proposed.Furthermore, to fit the extracted coreset, a novel distributed adaptive sparse network model evolution mechanism was designed to dynamically adjust the structure and the training model size before each global training iteration, which reduced the number of communication bits between edge devices and the server while also guarantees the training model accuracy.Experimental results show that the proposed method achieves 17% reduction in communication bits transmission while only 0.5% degradation in model accuracy compared with state-of-the-art method.…”
Get full text
Article -
11479
A Regularized Alternating Least-Squares Method for Minimizing a Sum of Squared Euclidean Norms with Rank Constraint
Published 2022-01-01“…Additionally, we present an algorithm based on the regularized alternating least-squares (RALS) method for solving the MSSEN-RC problem. …”
Get full text
Article -
11480
Energy Management Strategy Optimization of HEV based on Driving Pattern Recognition
Published 2016-01-01“…The 23 typical driving cycles are chosen from ADVISOR software and five categories are divided by using clustering analysis method,the key parameters of each category are optimized by using particle swarm algorithm,with the goal of reducing fuel consumption,relevant optimized results are saved in database,an energy management strategy optimization method of HEV based on driving pattern recognition is proposed.Finally,the simulation analysis for the energy management is carried out under a comprehensive test cycle,simulation results show that vehicle fuel consumption is cut down 12. 77%,and the deviation of the battery SOC have greatly decrease compare with other energy management strategy which based on driving pattern recognition.…”
Get full text
Article