-
9161
A new approach of anomaly detection in wireless sensor networks using support vector data description
Published 2017-01-01“…First, the strategy of training sample reduction is used to cut back the number of samples and then the sequential minimal optimization algorithm based on the second-order approximation is implemented on the sample set to achieve the goal of reducing the training time. …”
Get full text
Article -
9162
Remote Minimally Invasive Surgery – Haptic Feedback and Selective Automation in Medical Robotics
Published 2011-01-01“…We propose a XFEM-based incision force prediction algorithm that simulates the incision contact-forces in real-time and compensates the delayed force sensor readings. …”
Get full text
Article -
9163
TEACHING COMPUTATIONAL THINKING IN SAUDI ARABIAN SCHOOLS USING SMARTPHONE APPS
Published 2024-10-01“…Computational thinking, encompassing problem-solving, computational logic, and algorithmic thinking, is an essential skill in the modern world. …”
Get full text
Article -
9164
Advanced retinal disease detection from OCT images using a hybrid squeeze and excitation enhanced model.
Published 2025-01-01“…<h4>Results</h4>The combined features from EfficientNetB0 and Xception are processed via fully connected layers and categorized using the Softmax algorithm. The methodology was tested on UCSD and Duke's OCT datasets and produced excellent results. …”
Get full text
Article -
9165
Design of an Incremental Music Teaching and Assisted Therapy System Based on Artificial Intelligence Attention Mechanism
Published 2022-01-01“…In this paper, from algorithm design to experimental validation, both in terms of accuracy, the operational difficulty of the experiment, consumption of arithmetic power, and time cost, the unique superiority of the artificial intelligence attention-based combined with incremental music teaching adjunctive therapy system proposed in this paper can be seen in the MS lesion segmentation task.…”
Get full text
Article -
9166
Optimization of Bulk Cargo Terminal Unloading and Outbound Operations Based on a Deep Reinforcement Learning Framework
Published 2025-01-01“…Secondly, this study proposes an advanced solution methodology that employs a reinforcement learning technique integrating a Dueling Deep Q-Network and Double Deep Q-Network. This hybrid algorithm significantly enhances optimization performance and accelerates the learning process, thereby improving the efficiency of the solutions. …”
Get full text
Article -
9167
An adaptive voltage reference based multi-objective line flow control methods for MMC-MTDC system
Published 2025-03-01“…A pre-evaluation method is proposed to choose appropriate control variables and accelerate the convergence of optimization algorithms. The effectiveness of the proposed approach is validated through comparisons with several algorithms. …”
Get full text
Article -
9168
Fleet Management for HDVs and CAVs on Highway in Dense Fog Environment
Published 2020-01-01“…As to improve the traffic flow throughput and driving safety in dense fog weather condition on highway, this paper uses a mathematical modeling method to study and control the fleet mixed with human-driven vehicles (HDVs) and connected automatic vehicles (CAVs) in dense fog environment on highway based on distributed model predictive control algorithm (DMPC), along with considering the car-following behavior of HDVs driver based on cellular automatic (CA) model. …”
Get full text
Article -
9169
Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials
Published 2018-01-01“…The calculations performed have allowed finding an analytical solution which was compared with numerical solutions obtained by using the shooting method and the fourth-order Runge-Kutta algorithm. These analytical and numerical results have shown that the values of tangential stresses are greater than the radial stresses. …”
Get full text
Article -
9170
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. …”
Get full text
Article -
9171
Experimental Characterisation of the Interfacial Structure during Counter-Current Flow Limitation in a Model of the Hot Leg of a PWR
Published 2012-01-01“…The structure of the interface was observed from the side of the channel test section using a high-speed video camera. An algorithm was developed to recognise the stratified interface in the camera frames after background subtraction. …”
Get full text
Article -
9172
Fast Detection of Deceptive Reviews by Combining the Time Series and Machine Learning
Published 2021-01-01“…Secondly, a co-training two-view semisupervised learning algorithm was performed in each captured interval, in which linguistic cues, metadata, and user purchase behaviors were synthetically employed to classify the reviews and check whether they are spam ones or not. …”
Get full text
Article -
9173
Advanced Text Summarization Model Incorporating NLP Techniques and Feature-Based Scoring
Published 2025-01-01“…This study’s summarization algorithm was tested using the CNN, XSum and BBC Summarization datasets, which aggregate documents from different areas. …”
Get full text
Article -
9174
Recent Progress about Flight Delay under Complex Network
Published 2021-01-01“…This may be achieved by analyzing flight delay in frequency domain instead of time domain. (4) Summation of most critical nodes/edges may not be the most crucial group to network resilience or flight delay propagations. Effective algorithm for most influential sequence is to be developed.…”
Get full text
Article -
9175
Assessing Hydropower Potential in Nepal’s Sunkoshi River Basin: An Integrated GIS and SWAT Hydrological Modeling Approach
Published 2024-01-01“…The Sequential Uncertainty Fitting Version 2 (SUFI-2) algorithm, integrated within the SWAT Calibration and Uncertainty Program (SWAT-CUP), was employed to calibrate and validate the model. …”
Get full text
Article -
9176
Retinal Fundus Image Enhancement Using the Normalized Convolution and Noise Removing
Published 2016-01-01“…First, the original retinal fundus image was processed by the normalized convolution algorithm with a domain transform to obtain an image with the basic information of the background. …”
Get full text
Article -
9177
Optimal Bus-Bridging Service under a Metro Station Disruption
Published 2018-01-01“…Two main contributions are made: (1) a three-layer discrete choice behavior model is developed to analyze the dynamic passenger flow demand under station disruption; and (2) an integrated algorithm is designed to manage and control the station disruption crisis by providing additional bus-bridging services with the objective of minimizing the total travel time of affected passengers and the operating cost of bridging-buses. …”
Get full text
Article -
9178
Testing convolutional neural network based deep learning systems: a statistical metamorphic approach
Published 2025-01-01“…Furthermore, we also propose an MRs minimization algorithm for the CUT, thus saving computational costs and organizational testing resources.…”
Get full text
Article -
9179
Using the clustering method to find the final environmental parameters coefficients in road construction projects
Published 2025-02-01“…In the first phase, the Genetic Optimization Algorithm was implemented to determine convenient coefficients for the relevant parameters. …”
Get full text
Article -
9180
Effects of Regional Trade Agreement to Local and Global Trade Purity Relationships
Published 2020-01-01“…Here, we separate the influence of geographical distance, economic volume, and overall increase in transportation and labor costs and use the expectation maximization algorithm to optimize the parameters and quantify the trade purity indicator, which describes the true global trade environment and relationships among countries. …”
Get full text
Article