Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (366)
  • Open Access

    ARTICLE

    Enhanced Deep Reinforcement Learning Strategy for Energy Management in Plug-in Hybrid Electric Vehicles with Entropy Regularization and Prioritized Experience Replay

    Li Wang1,*, Xiaoyong Wang2

    Energy Engineering, Vol.121, No.12, pp. 3953-3979, 2024, DOI:10.32604/ee.2024.056705 - 22 November 2024

    Abstract Plug-in Hybrid Electric Vehicles (PHEVs) represent an innovative breed of transportation, harnessing diverse power sources for enhanced performance. Energy management strategies (EMSs) that coordinate and control different energy sources is a critical component of PHEV control technology, directly impacting overall vehicle performance. This study proposes an improved deep reinforcement learning (DRL)-based EMS that optimizes real-time energy allocation and coordinates the operation of multiple power sources. Conventional DRL algorithms struggle to effectively explore all possible state-action combinations within high-dimensional state and action spaces. They often fail to strike an optimal balance between exploration and exploitation, and… More >

  • Open Access

    ARTICLE

    Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems

    Ting Chen1, Shuna Jiang2, Xin Fan3,*, Jianchuan Xia2, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2195-2217, 2024, DOI:10.32604/cmc.2024.056960 - 18 November 2024

    Abstract In blockchain-based unmanned aerial vehicle (UAV) communication systems, the length of a block affects the performance of the blockchain. The transmission performance of blocks in the form of finite character segments is also affected by the block length. Therefore, it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems, especially in wireless environments involving UAVs. This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission. In our scheme, using a friendly jamming UAV… More >

  • Open Access

    ARTICLE

    A Lightweight UAV Visual Obstacle Avoidance Algorithm Based on Improved YOLOv8

    Zongdong Du1,2, Xuefeng Feng3, Feng Li3, Qinglong Xian3, Zhenhong Jia1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2607-2627, 2024, DOI:10.32604/cmc.2024.056616 - 18 November 2024

    Abstract The importance of unmanned aerial vehicle (UAV) obstacle avoidance algorithms lies in their ability to ensure flight safety and collision avoidance, thereby protecting people and property. We propose UAD-YOLOv8, a lightweight YOLOv8-based obstacle detection algorithm optimized for UAV obstacle avoidance. The algorithm enhances the detection capability for small and irregular obstacles by removing the P5 feature layer and introducing deformable convolution v2 (DCNv2) to optimize the cross stage partial bottleneck with 2 convolutions and fusion (C2f) module. Additionally, it reduces the model’s parameter count and computational load by constructing the unite ghost and depth-wise separable… More >

  • Open Access

    ARTICLE

    Special Vehicle Target Detection and Tracking Based on Virtual Simulation Environment and YOLOv5-Block+DeepSort Algorithm

    Mingyuan Zhai1,2, Hanquan Zhang1, Le Wang1, Dong Xiao1,*, Zhengmin Gu3, Zhenni Li1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3241-3260, 2024, DOI:10.32604/cmc.2024.056241 - 18 November 2024

    Abstract In the process of dense vehicles traveling fast, there will be mutual occlusion between vehicles, which will lead to the problem of deterioration of the tracking effect of different vehicles, so this paper proposes a research method of virtual simulation video vehicle target tracking based on you only look once (YOLO)v5s and deep simple online and realtime tracking (DeepSort). Given that the DeepSort algorithm is currently the most effective tracking method, this paper merges the YOLOv5 algorithm with the DeepSort algorithm. Then it adds the efficient channel attention networks (ECA-Net) focusing mechanism at the back… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    ARTICLE

    Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments

    Wenming Wang1,2,3,*, Zhiquan Liu1, Shumin Zhang1, Guijiang Liu1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2517-2545, 2024, DOI:10.32604/cmc.2024.055184 - 18 November 2024

    Abstract Advancements in the vehicular network technology enable real-time interconnection, data sharing, and intelligent cooperative driving among vehicles. However, malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users. Trust mechanisms serve as an effective solution to this issue. In recent years, many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes, incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area. In this paper, we propose a distributed vehicular network scheme based on trust scores. Specifically, the designed architecture partitions multiple More >

  • Open Access

    PROCEEDINGS

    Fragment Penetration Damage Characteristics of Typical Composite Armor

    Yuan Li1,3,*, Zhiqiang Fan1,2, Tao Suo1,3

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.3, pp. 1-2, 2024, DOI:10.32604/icces.2024.013336

    Abstract Light armored vehicles, as the primary means of force transport on contemporary battlefields, require not only high mobility but also better protection to meet the complex battlefield environment and mission requirements. Composite armor is widely used in the design of light armored vehicles due to its lightweight and excellent defensible performance. In this paper, the damage law of the composite armor of an infantry fighting vehicle, when penetrated by fragment-simulated projectiles (FSP), is studied by numerical simulation, and the homogeneous equivalent targets surrogating a combination of local protective armor and vulnerable parts are constructed based More >

  • Open Access

    REVIEW

    Analyzing Real-Time Object Detection with YOLO Algorithm in Automotive Applications: A Review

    Carmen Gheorghe*, Mihai Duguleana, Razvan Gabriel Boboc, Cristian Cezar Postelnicu

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 1939-1981, 2024, DOI:10.32604/cmes.2024.054735 - 31 October 2024

    Abstract Identifying objects in real-time is a technology that is developing rapidly and has a huge potential for expansion in many technical fields. Currently, systems that use image processing to detect objects are based on the information from a single frame. A video camera positioned in the analyzed area captures the image, monitoring in detail the changes that occur between frames. The You Only Look Once (YOLO) algorithm is a model for detecting objects in images, that is currently known for the accuracy of the data obtained and the fast-working speed. This study proposes a comprehensive More >

  • Open Access

    ARTICLE

    Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology

    Muhammad Imran Ghafoor1, Awad Bin Naeem2,*, Biswaranjan Senapati3, Md. Sakiul Islam Sudman4, Satyabrata Pradhan5, Debabrata Das6, Friban Almeida6, Hesham A. Sakr7

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 783-803, 2024, DOI:10.32604/iasc.2024.050819 - 31 October 2024

    Abstract The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles. The Internet of Vehicles has meaningful applications, enabling connected and autonomous vehicles to interact with infrastructure, sensors, computing nodes, humans, and fellow vehicles. Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards. This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication, utilizing encryption and the Moore curve. The proposed approach enables a vehicle to deduce the planned itinerary of Roadside More >

  • Open Access

    ARTICLE

    An Optimisation Strategy for Electric Vehicle Charging Station Layout Incorporating Mini Batch K-Means and Simulated Annealing Algorithms

    Haojie Yang, Xiang Wen, Peng Geng*

    Journal on Artificial Intelligence, Vol.6, pp. 283-300, 2024, DOI:10.32604/jai.2024.056303 - 18 October 2024

    Abstract To enhance the rationality of the layout of electric vehicle charging stations, meet the actual needs of users, and optimise the service range and coverage efficiency of charging stations, this paper proposes an optimisation strategy for the layout of electric vehicle charging stations that integrates Mini Batch K-Means and simulated annealing algorithms. By constructing a circle-like service area model with the charging station as the centre and a certain distance as the radius, the maximum coverage of electric vehicle charging stations in the region and the influence of different regional environments on charging demand are… More >

Displaying 1-10 on page 1 of 366. Per Page