-
13641
Optimizing Train Timetable Based on Departure Time Preference of Passengers for High-Speed Rails
Published 2021-01-01“…Finally, a real-world numerical experiment is conducted to verify the effectiveness of both the model and the algorithm.…”
Get full text
Article -
13642
Research on the evaluation method of cooperative jamming effectiveness based on IPSO-ELM
Published 2025-01-01“…Finally, the IPSO-ELM algorithm is subjected to rigorous assessment via simulation, confirming its performance of accuracy and efficiency. …”
Get full text
Article -
13643
Shallow Foundation Settlement Quantification: Application of Hybridized Adaptive Neuro-Fuzzy Inference System Model
Published 2020-01-01“…This research emphasis on the implementation of newly developed machine learning models called hybridized Adaptive Neuro-Fuzzy Inference System (ANFIS) with Particle Swarm Optimization (PSO) algorithm, Ant Colony optimizer (ACO), Differential Evolution (DE), and Genetic Algorithm (GA) as efficient approaches to predict settlement of shallow foundation over cohesion soil properties. …”
Get full text
Article -
13644
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01“…We first present a three‐clock cycle, divide‐and‐conquer multiplication algorithm which greatly reduces the number of execution cycles of multiplication. …”
Get full text
Article -
13645
Data-driven optimization design method and tool platform for green residential area layout
Published 2025-01-01“…A parametric generative algorithm is developed to automatically generate design schemes for typical Chinese urban residential areas based on a sustainable, performance-oriented design flow. …”
Get full text
Article -
13646
The Role of Performance Metrics in Estimating Market Values of Footballers in Europe's Top Five Leagues
Published 2024-12-01“…The CNN algorithm achieved the highest accuracy, with a success rate of 97%. …”
Get full text
Article -
13647
Identification of Vibration Signal for Residual Pressure Utilization Hydraulic Unit Using MRFO-BP Neural Network
Published 2022-01-01“…The weights and thresholds in BP neural network are optimized by the MRFO algorithm. The feature vectors are input into the optimized BP neural network to realize the identification and classification of vibration signals. …”
Get full text
Article -
13648
Ship-Borne Phased Array Radar Using GA Based Adaptive α-β-γ Filter for Beamforming Compensation and Air Target Tracking
Published 2015-01-01“…Finally, it is proved that the proposed GA based adaptive α-β-γ filter is a real time applicable algorithm for ship-borne phased array radar.…”
Get full text
Article -
13649
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…After analyzing the sparse matrix encryption algorithm, it is found that there are two challenges. …”
Get full text
Article -
13650
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
13651
A Two-Stage Robust Optimization Method Based on the Expected Scenario for Islanded Microgrid Energy Management
Published 2021-01-01“…According to the structural characteristics of the proposed model based on the E-TSRO method, a column-and-constraint generation (C & CG) algorithm is utilized to solve the proposed model. …”
Get full text
Article -
13652
Enhancing Stock Portfolio Selection with Trapezoidal Bipolar Fuzzy VIKOR Technique with Boruta-GA Hybrid Optimization Model: A Multicriteria Decision-Making Approach
Published 2025-01-01“…The Boruta-GA approach combines the advantages of the Genetic Algorithm (GA) and Boruta Optimization Algorithm (BOA) methods, implementing the comprehensive feature selection capability of Boruta to detect all relevant features and harnessing the strength of GA to bring about improvement within a wide range of datasets. …”
Get full text
Article -
13653
Maximum Butterfly Generators Search in Bipartite Networks
Published 2024-12-01“…Furthermore, an effective MBGS search algorithm is proposed. Extensive experiments on real-world networks with ground-truth communities and interesting case studies validated the effectiveness and efficiency of our MBGS model and algorithm.…”
Get full text
Article -
13654
Binaural Active Audition for Humanoid Robots to Localise Speech over Entire Azimuth Range
Published 2009-01-01“…The expectation-maximisation (EM) algorithm helped the system to cope with several moving sound sources and reduce localisation errors. …”
Get full text
Article -
13655
Culture under Complex Perspective: A Classification for Traditional Chinese Cultural Elements Based on NLP and Complex Networks
Published 2021-01-01“…After analyzing the topological characteristics of the network, the community detection algorithm is used to identify the topics of cultural elements. …”
Get full text
Article -
13656
Hybrid Deep-Learning Framework Based on Gaussian Fusion of Multiple Spatiotemporal Networks for Walking Gait Phase Recognition
Published 2020-01-01“…The framework proposed in this paper implements the inner loop that also contains the EM algorithm in the outer loop and optimizes the reverse gradient in the entire network. …”
Get full text
Article -
13657
ESP32 and MAX30100 with Chebyshev Filter for Enhanced Heart and Oxygen Measurement
Published 2024-10-01“…The digital signal processing method uses the Chebyshev II filter on PPG to reduce noise, and the RSA algorithm is employed to enhance data security. The results of testing the MAX30100 sensor value without a filter produced the lowest error value of 0.97%, the highest 6.59% for BPM, the lowest error value of 1.88%, and the highest error of 2.66% for SpO2. …”
Get full text
Article -
13658
A New Method Based on Operational Strategies for Early Detection of Breast Cancers
Published 2020-08-01“…Results: This article proposes a new algorithm for diagnosing benign and malignant cancers. …”
Get full text
Article -
13659
Fault Diagnosis Method of Distribution Equipment Based on Hybrid Model of Robot and Deep Learning
Published 2022-01-01“…Finally, the residual network is used to improve the region-based fully convolutional networks (R-FCN) algorithm, and the improved R-FCN algorithm trained by the online hard example mining method is used for fault feature learning. …”
Get full text
Article -
13660
Utilizing machine learning to predict hospital admissions for pediatric COVID-19 patients (PrepCOVID-Machine)
Published 2025-01-01“…Grid Search was used to optimize the hyperparameters of each algorithm. The study analyzed 1988 children and 30 study variables after data were processed. …”
Get full text
Article