-
421
A Deployment Method for Motor Fault Diagnosis Application Based on Edge Intelligence
Published 2024-12-01“…This approach significantly reduces the computational complexity of the model while maintaining high diagnostic accuracy, making it well suited for edge nodes in industrial IoT scenarios. …”
Get full text
Article -
422
Hamilton-Jacobi Reachability in Reinforcement Learning: A Survey
Published 2024-01-01“…Previously, HJ reachability was restricted to verifying low-dimensional dynamical systems primarily because the computational complexity of the dynamic programming approach it relied on grows exponentially with the number of system states. …”
Get full text
Article -
423
Probe Selection and Power Weighting in Multiprobe OTA Testing: A Neural Network-Based Approach
Published 2019-01-01“…., the well-known multishot algorithm, the proposed NN-based approach can yield similar channel emulation accuracy with significantly reduced computational complexity.…”
Get full text
Article -
424
Control of Magnetic Manipulator Using Reinforcement Learning Based on Incrementally Adapted Local Linear Models
Published 2021-01-01“…While all of the approximation methods were successful, MGGP achieved the best results at the cost of higher computational complexity. Index Terms–AI-based methods, local linear regression, nonlinear systems, magnetic manipulation, model learning for control, optimal control, reinforcement learning, symbolic regression.…”
Get full text
Article -
425
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
426
A Robust k-Means Clustering Algorithm Based on Observation Point Mechanism
Published 2020-01-01“…The theoretical analysis and experimental results show that the proposed clustering algorithm has the lower computational complexity and better robustness in comparison with k-means clustering algorithm, thus demonstrating the feasibility and effectiveness of our proposed clustering algorithm.…”
Get full text
Article -
427
Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique
Published 2017-01-01“…For the 3D image reconstruction under two-dimensional (2D) planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. …”
Get full text
Article -
428
Reactive power optimization via deep transfer reinforcement learning for efficient adaptation to multiple scenarios
Published 2025-03-01“…Existing reinforcement learning algorithms alleviate the computational complexity in optimization but suffer from the inefficiency of model retraining for different operating scenarios. …”
Get full text
Article -
429
LHB-YOLOv8: An Optimized YOLOv8 Network for Complex Background Drop Stone Detection
Published 2025-01-01“…Finally, a bidirectional feature pyramid network (BiFPN) is introduced in the neck to effectively reduce the parameters and computational complexity and improve the overall performance of rockfall detection. …”
Get full text
Article -
430
Power Converter Fault Detection Using MLCA–SpikingShuffleNet
Published 2025-01-01“…This paper first designs an efficient SpikingShuffle Unit that integrates grouped convolutions and channel shuffle techniques, effectively reducing the model’s computational complexity by optimizing feature extraction and channel interaction. …”
Get full text
Article -
431
Identifying vital spreaders in large-scale networks based on neighbor multilayer contributions
Published 2025-01-01“…These tests demonstrated the effectiveness of our proposed algorithm in identifying influential spreaders accurately.DiscussionFurthermore, computational complexity analysis indicates that our algorithm consumes less time compared to existing methods, suggesting it can be efficiently applied to large-scale networks.…”
Get full text
Article -
432
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT
Published 2025-01-01“…To address these limitations, RWA-BFT adopts a two-layer blockchain architecture; the first layer leverages reputation-based filtering to reduce computational complexity by excluding low-reputation nodes, while the second layer employs an asynchronous consensus mechanism to ensure efficient and secure communication among high-reputation nodes, even under network delays. …”
Get full text
Article -
433
PilotCareTrans Net: an EEG data-driven transformer for pilot health monitoring
Published 2025-01-01“…PilotCareTrans Net was evaluated on multiple public EEG datasets, including MODA, STEW, SJTUEmotion EEG, and Sleep-EDF, where it outperformed state-of-the-art models in key metrics.Results and discussionThe experimental results demonstrate the model's ability to not only enhance prediction accuracy but also reduce computational complexity, making it suitable for real-time applications in resource-constrained settings. …”
Get full text
Article -
434
Compressive Sensing Based Bayesian Sparse Channel Estimation for OFDM Communication Systems: High Performance and Low Complexity
Published 2014-01-01“…To improve the estimation performance, we proposed a compressive sensing based Bayesian sparse channel estimation (BSCE) method which cannot only exploit the channel sparsity but also mitigate the unexpected channel uncertainty without scarifying any computational complexity. The proposed method can reveal potential ambiguity among multiple channel estimators that are ambiguous due to observation noise or correlation interference among columns in the training matrix. …”
Get full text
Article -
435
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01“…This allows to leverage the learning by transference on the graphs to address the computational complexity and environmental concerns of training on large-scale systems, and the dynamicity resulting from the spatio-temporal evolution of power systems. …”
Get full text
Article -
436
Rapid Fluid Velocity Field Prediction in Microfluidic Mixers via Nine Grid Network Model
Published 2024-12-01“…Traditionally, the simulation of these mixers relies on the finite element method (FEM), which, although effective, presents challenges due to its computational complexity and time-consuming nature. To address this, we propose a nine-grid network (NGN) model theory with a centrally symmetric structure.The NGN uses a symmetric structure similar to a 3 × 3 grid to partition the fluid space to be predicted. …”
Get full text
Article -
437
Novel and Efficient Randomized Algorithms for Feature Selection
Published 2020-09-01“…We conduct theoretical computational complexity analysis and further explain our algorithms’ generic parallelizability. …”
Get full text
Article -
438
Outage analysis and power optimization in uplink and downlink NOMA systems with Rician fading
Published 2025-03-01“…By approximating the Rician distribution with a Gamma distribution, the closed-form expressions for outage probability are derived, reducing computational complexity. A novel low-complexity power allocation (PA) strategy is introduced to maximize the sum spectral efficiency (SSE) in NOMA systems even in the presence of iSIC. …”
Get full text
Article -
439
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01“…It is challenging to implement a scalar multiplication (SM) operation which has the highest computational complexity in ECC. In this study, we propose a hardware processor which achieves high speed and high security for ECC. …”
Get full text
Article -
440
Multi-Centroid Extraction Method for High-Dynamic Star Sensors Based on Projection Distribution of Star Trail
Published 2025-01-01“…First, the mapping relationship between attitude information and star trails is constructed based on a geometric imaging model, and an endpoint centroid group extraction strategy is designed from the perspectives of time synchronization and computational complexity. Then, the endpoint position parameters are determined by fitting the star trail grayscale projection using a line spread function, and accurate centroid localization is achieved through principal axis analysis and inter-frame correlation. …”
Get full text
Article