-
14241
Exploiting Multiple Channels for Low Latency and Semireliable Broadcasting in Cognitive Wireless Sensor Networks
Published 2015-10-01“…Channel assignment algorithms can be applied in cognitive radio enabled networks which performs dynamic channel configuration for utilizing multiple channels. …”
Get full text
Article -
14242
A Design Procedure and Control Method for Improving Efficiency of a Family of Resonant Converters Over Wide Operating Conditions
Published 2025-01-01“…Here, a novel design procedure and control method are proposed for the resonant converters, which have parallel components in their resonant tank circuits to address their light-load or no-load low-efficiency issues. This control algorithm is based on the frequency modulation method and utilizes a variable capacitor or inductor in the resonant tank circuit, simultaneously. …”
Get full text
Article -
14243
Initialization Methods for FPGA-Based EMT Simulations
Published 2024-01-01“…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. …”
Get full text
Article -
14244
Parallel Integral Equation-Based Nonoverlapping DDM for Solving Challenging Electromagnetic Scattering Problems of Two Thousand Wavelengths
Published 2019-01-01“…A parallel multilevel fast multipole algorithm (MLFMA) is extended to accelerate matrix-vector multiplications of subdomains as well as the coupling between them, and the coupling between different subdomains is computed in the manner of near field to avoid the storage of the mutual impedance. …”
Get full text
Article -
14245
Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network
Published 2024-01-01“…We employ a model-free Q-learning algorithm for training of the Q-agent. We use stochastic geometry as a tool for estimating the average data rate offered by the network in a given region by considering the effect of interference. …”
Get full text
Article -
14246
Complexity Analysis of New Future Video Coding (FVC) Standard Technology
Published 2021-01-01“…In this paper, we provide a fast FVC algorithm to achieve better performance and to reduce encoding complexity. …”
Get full text
Article -
14247
Intelligent Traffic Management System Based on the Internet of Vehicles (IoV)
Published 2021-01-01“…Our proposed adaptive algorithm not only significantly reduces the average waiting time (delay) but also increases the number of serviced vehicles. …”
Get full text
Article -
14248
Fermentasi biji durian khas Kalimantan sebagai pengganti tepung terigu dengan metode perendaman berseri
Published 2025-01-01“…Runge-Kutta (RK) third-order method used the kinetic modeling algorithm. The RK solver was completed using the optimization solver in Ms. …”
Get full text
Article -
14249
Exploiting the Composite Step Strategy to the Biconjugate A-Orthogonal Residual Method for Non-Hermitian Linear Systems
Published 2013-01-01“…Another benefit acquired is that it seems to be a viable algorithm providing some further practically desired smoothing of the convergence history of the norm of the residuals, which is justified by numerical experiments. …”
Get full text
Article -
14250
Runoff Prediction and Uncertainty Analysis for Xijiang River Basin Based on CMIP6 Climate Scenarios
Published 2025-01-01“…Based on this, the Xin'anjiang hydrological model (XAJ) is built, and the particle swarm optimization (PSO) algorithm is employed to calibrate and validate the model parameters. …”
Get full text
Article -
14251
Cascaded H-Bridge MLI and Three-Phase Cascaded VSI Topologies for Grid-Connected PV Systems with Distributed MPPT
Published 2019-01-01“…Distributed maximum power point tracking (MPPT) of PV modules using perturbation and observation algorithm is used for all presented topologies. In all presented configurations, each PV module is connected to one DC-DC isolated Ćuk converter for best MPPT achievement. …”
Get full text
Article -
14252
Fatigue Driving Prediction on Commercial Dangerous Goods Truck Using Location Data: The Relationship between Fatigue Driving and Driving Environment
Published 2020-01-01“…The driver’s yawn data are used as a proxy for ground truth for the classification algorithm. From the six different categories of the predictor set, we obtain a set of 17 predictor variables to train logistic regression, neural network, and random forest classifiers. …”
Get full text
Article -
14253
Null Field and Interior Field Methods for Laplace’s Equation in Actually Punctured Disks
Published 2013-01-01“…For the NFM, the conservative schemes were proposed in Lee et al. (2013), and the algorithm singularity was fully investigated in Lee et al., submitted to Engineering Analysis with Boundary Elements, (2013). …”
Get full text
Article -
14254
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
14255
Revisiting the trading activity of high-frequency trading firms around ultra-fast flash events
Published 2025-01-01“…We compare our sample of SFEs with both the so-called “mini flash crashes”, as identified by the Nanex detection algorithm, and the so-called EPMs, as identified by Brogaard et al. (2018). …”
Get full text
Article -
14256
AI-Based Screening Method for Early Identification of Invasive Ductal Carcinoma in Breast Cancer
Published 2024-06-01“…To achieve this, we utilized a deep learning neural network algorithm, employing histopathological microscopic datasets and histological microscopic images from 124 and 576 patients with ductal carcinoma of the breast, respectively. …”
Get full text
Article -
14257
Construction of a 5G Wireless Semantic Web-Assisted English Digital Learning Resource Query System
Published 2021-01-01“…We propose a quality algorithm for 5G wireless networks, which not only captures the characteristics of 5G wireless networks such as local broadcast and node movement but also combines quality predicates as guards with broadcast reception actions, which are used to portray that a node can continue to execute subsequent processes only when the node reception actions satisfy certain conditions, which works together with the node default value mechanism to reduce the impact caused by unreliable links. …”
Get full text
Article -
14258
Adaptive Filtering for Channel Estimation in RIS-Assisted mmWave Systems
Published 2025-01-01“…These algorithms leverage the sparse nature of mmWave channels to improve estimation accuracy. …”
Get full text
Article -
14259
Active Vibration Control of Helicopter Maneuvering Flight Using Feedforward-Robust Hybrid Control Based on Reference Signal Reconstruction
Published 2021-01-01“…Numerical and experimental results reveal that the proposed algorithm is practical for suppressing transient disturbance and multifrequency helicopter vibration response during maneuvering flight with faster convergence speed and better robustness.…”
Get full text
Article -
14260
Task Offloading with LLM-Enhanced Multi-Agent Reinforcement Learning in UAV-Assisted Edge Computing
Published 2024-12-01“…The application of value decomposition algorithms for UAV trajectory planning has drawn considerable research attention. …”
Get full text
Article