-
3941
Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks
Published 2012-12-01“…In this paper, we study the problem of power assignment in order that its induced communication graph meets the following properties: (1) it is an energy- t -spanner which is energy efficient; (2) it is k -fault resistant which can withstand up to k - 1 node failures where k ⩾ 1; (3) the interference is minimal. We propose algorithms to address this problem. Both the theoretic analysis and the simulations in the paper prove that our algorithms can induce a k -fault resistant energy spanner and furthermore the interference is minimized. …”
Get full text
Article -
3942
New Wavelets Collocation Method for Solving Second-Order Multipoint Boundary Value Problems Using Chebyshev Polynomials of Third and Fourth Kinds
Published 2013-01-01“…This paper is concerned with introducing two wavelets collocation algorithms for solving linear and nonlinear multipoint boundary value problems. …”
Get full text
Article -
3943
Construction of College Students’ Mental Health Assessment and Art Therapy System Aided by the Internet of Things and Big Data
Published 2022-01-01“…In order to improve the effect of college students’ mental health assessment, this paper combines the Internet of Things and big data technology to build a college student’s mental health assessment system and analyzes and verifies the clustering effectiveness indicators by using FCM, GK, and GG clustering algorithms. Moreover, this paper explores the basic concepts and processes of FCM algorithm, GK algorithm, and GG algorithm and expounds the connection between the three algorithms. …”
Get full text
Article -
3944
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
Published 2022-03-01“…Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.…”
Get full text
Article -
3945
Categorizing and Determining of BI-RAD Breast Cancer Score by Using Deep Learning Techniques
Published 2024-11-01“…Artificial intelligence algorithms have created many techniques to extract features from massive volumes of data through training, such as deep learning. …”
Get full text
Article -
3946
-
3947
A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection
Published 2025-01-01“…To address the RRT* algorithm’s limitation in dynamic obstacle avoidance, a local path-planning method combining the improved DWA algorithm is proposed, improving efficiency in areas with dense obstacles. …”
Get full text
Article -
3948
Effectiveness of Centrality Measures for Competitive Influence Diffusion in Social Networks
Published 2025-01-01“…They independently and simultaneously select their seeds (initial adopters) using an algorithm from a finite strategy space of algorithms. …”
Get full text
Article -
3949
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. …”
Get full text
Article -
3950
Digital Twin Framework Using Real-Time Asset Tracking for Smart Flexible Manufacturing System
Published 2025-01-01“…To achieve ultimate efficiency, the current study experimented with a range of machine-learning algorithms. The algorithms include Support Vector Machines (SVM), Random Forests (RF), Decision Trees, K-Nearest Neighbors (KNN) and Convolutional Neural Networks (CNN). …”
Get full text
Article -
3951
3GPP-Compliant Datasets for xG Location-Aware Networks
Published 2024-01-01“…This calls for new localization algorithms as well as for 3GPP-standardized scenarios to support their systematic development and testing. …”
Get full text
Article -
3952
Programming for Stimulation-Induced Transient Nonmotor Psychiatric Symptoms after Bilateral Subthalamic Nucleus Deep Brain Stimulation for Parkinson’s Disease
Published 2017-01-01“…In these patients, the contacts inducing STPS were found and the programming protocol algorithms used. Results. Eleven patients were diagnosed with STPS. …”
Get full text
Article -
3953
Exploring sentiment analysis in handwritten and E-text documents using advanced machine learning techniques: a novel approach
Published 2025-01-01“…It may further be increased by employing a hybrid approach of intelligent algorithms. This study highlights the adaptability of the ESIHE_AML algorithms-based model for analyzing sentiments in digital communication systems of the modern era.…”
Get full text
Article -
3954
Interacting Large Language Model Agents Bayesian Social Learning Based Interpretable Models
Published 2025-01-01“…This paper discusses the theory and algorithms for interacting large language model agents (LLMAs) using methods from statistical signal processing and microeconomics. …”
Get full text
Article -
3955
A Novel Ensemble Classifier Selection Method for Software Defect Prediction
Published 2025-01-01“…The experimental results demonstrate that the DFD ensemble learning-based software defect prediction model outperforms the ten other models, including five common machine learning (ML) classification algorithms (logistic regression (LR), naïve Bayes (NB), K-nearest neighbor (KNN), decision tree (DT), and support vector machine (SVM)), two deep learning (DL) algorithms (multi-layer perceptron (MLP) and convolutional neural network (CNN)), and three ensemble learning algorithms (random forest (RF), extreme gradient boosting (XGB), and stacking). …”
Get full text
Article -
3956
Prediction of the Bending Strength of Boltless Steel Connections in Storage Pallet Racks: An Integrated Experimental-FEM-SVM Methodology
Published 2020-01-01“…The results obtained indicate that the SVM algorithms slightly outperform the ANN algorithms, although both of them are in good agreement with FEM and physical test. …”
Get full text
Article -
3957
Lipid Mediator Informatics and Proteomics in Inflammation-Resolution
Published 2006-01-01“…This review presents detailed protocols used in our lab for LM informatics and proteomics using LC-UV-MS/MS, GC-MS, ELISA, novel databases and searching algorithms, and 2-dimensional gel electrophoresis and LC-nanospray-MS/MS peptide mapping.…”
Get full text
Article -
3958
THE USE OF ARTIFICIAL INTELLIGENCE ON COLPOSCOPY IMAGES AND SEGMENTAL VOLUMES, CONSTRUCTED FROM MRI AND CT IMAGES, IN THE DIAGNOSIS AND STAGING OF PRECANCERS, CERVICAL CANCERS AND...
Published 2024-12-01“…Additionally, the research includes a comparative study of various algorithms and tools employed in segmental volumetric constructions to generate 3D images from MRI/CT data. …”
Get full text
Article -
3959
Sensor Image, Anomaly Detection Method for Hydroelectric Dam Structure Using Sensors Measurements and Deep Learning
Published 2025-01-01“…To better prevent future disasters, machine-learning algorithms have been employed. Often, these algorithms are trained on historical sensor data to predict future events. …”
Get full text
Article -
3960
Processing of retransmitted GPS signals in the problem of measuring the total electron content in the ionosphere
Published 2023-09-01“…The algorithm can be used for estimating TEC based on the retransmission of signals from GPS.…”
Get full text
Article