-
16641
Detection of Lungs Status Using Morphological Complexities of Respiratory Sounds
Published 2014-01-01“…The performance of the proposed method is compared with a wavelet analysis based method. The developed algorithm gives a better accuracy of 92.86% and sensitivity of 86.30% and specificity of 86.90% for a composite feature vector of four morphological indices.…”
Get full text
Article -
16642
Improving the Machine Learning Stock Trading System: An N-Period Volatility Labeling and Instance Selection Technique
Published 2024-01-01“…Financial technology is crucial for the sustainable development of financial systems. Algorithmic trading, a key area in financial technology, involves automated trading based on predefined rules. …”
Get full text
Article -
16643
Balancing mitigation strategies for viral outbreaks
Published 2024-12-01“…Our innovative approach to modeling the cost of control gave rise to a robust computational algorithm for solving optimal control problems associated with different public health regulations. …”
Get full text
Article -
16644
Novel 2D strain-rate-dependent lamina-based and RVE/phase-based progressive fatigue damage criteria for randomly loaded multi-layer fiber-reinforced composites
Published 2022-01-01“…A fatigue life assessment algorithm that incorporates the strain-rate-dependence of the fatigue strengths and stiffnesses, and random and asynchronous changes of the stress components, distinct mean values, and phase shifts of the stress components is employed. …”
Get full text
Article -
16645
Prototype System for Supporting Medical Diagnosis Based on Voice Interviewing
Published 2025-01-01“…An analysis of data mining and selected machine learning methods was carried out to develop an effective diagnosis algorithm. The system is designed to optimise patient care by automating the initial phase of the medical interview, which can lead to a reduction in errors due to subjective assessments and reduce the workload on doctors. …”
Get full text
Article -
16646
Multiframe maximum a posteriori estimators for single‐microphone speech enhancement
Published 2021-09-01“…In a noise‐reduction algorithm, all available information of recorded signals should be optimally utilized in the estimation process. …”
Get full text
Article -
16647
Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks
Published 2012-05-01“…This paper proposes a new routing algorithm schema based on event occurrence history to secure K-Coverage of event paths and maintain the maximum degree of coverage. …”
Get full text
Article -
16648
Acoustic analysis using symmetrised implicit midpoint rule
Published 2022-07-01“…Thus, this paper aims to analyse the dissipation, dispersion, accuracy, and stability of the Runge�Kutta method and derive a new scheme and algorithm that preserves the symmetry property. The symmetrised method is introduced in the time-of-finite-difference method for solving problems in aeroacoustics. …”
Get full text
Article -
16649
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01“…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
Get full text
Article -
16650
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
16651
LIGHTWEIGHT OF THE VEHICLE B PILLAR BASED ON SIX SIGMA ROBUST DESIGN UNDER SIDE IMPACT
Published 2016-01-01“…In this paper,by considering uncertainty factors,taking side impact of a car as an example,first of all,an accurate finite element model is established and verified according to relevant crash regulations,then,after building an approximate model and a deterministic optimization model,the optimal solution is obtained by sequential quadratic programming algorithm and the reliability analysis is used,finally the original vehicle B pillar is accomplished lightweight research and improvement by using six sigma robust design method. …”
Get full text
Article -
16652
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
Published 2025-01-01“…In this paper, we propose a zone-based secure routing algorithm to improve the performance of routing protocols. …”
Get full text
Article -
16653
Theory and Application of Interval-Valued Neutrosophic Line Graphs
Published 2024-01-01“…Finally, an overview of the algorithm used to solve the problems and the practical application of the introduced graphs were provided.…”
Get full text
Article -
16654
Congestion avoidance in 6G networks with V Gradient Geocast Routing Protocol
Published 2025-01-01“…This will be realized using highly technical approaches such as the mini-batch gradient descent optimization algorithm for network optimization and the V Gradient Geocast Routing Protocol for effective routing. …”
Get full text
Article -
16655
Detection of Degradation Effects in Field-Aged c-Si Solar Cells through IR Thermography and Digital Image Processing
Published 2012-01-01“…I-V curve analysis results showed an agreement between the source of electrical performance degradation and the degradation effects in the defected cell identified by the IR thermography. Finally, an algorithm was developed to automatically detect EVA discoloration in PV cells through processing of the digital image alone in a way closely imitating human perception of color. …”
Get full text
Article -
16656
Virtual Scoping: lightweight and scalable TSN time synchronization accuracy measurement method
Published 2024-09-01“…As an example of accuracy optimization, a frequency offset compensation algorithm based on V-Scope is designed and implemented, which improves the synchronization accuracy of the prototype system by 32.3%.…”
Get full text
Article -
16657
Research on the Combination Optimization Method of Aircraft Climb Parameters Considering the Influence of Pollution Emissions
Published 2022-01-01“…Next, we establish a combined optimization model of indicated airspeed and thrust using the genetic algorithm. The model simulation and result analysis are carried out using a wide-body aircraft. …”
Get full text
Article -
16658
Bearing Feature Extraction Method Based on the Time Subsequence
Published 2023-11-01“…Then, the random forest algorithm is used to count the class votes of all subsequences in each time series, and a dictionary is constructed based on the class votes. …”
Get full text
Article -
16659
Methodology to minimize the dynamic response of tall buildings under wind load controlled through semi-active magneto-rheological dampers
Published 2024-07-01“…In the second configuration, called Uncontrolled Optimized (C2), the fundamental frequency of the building is optimized via PSO algorithm as a function of its mass. Then, in the third configuration, Controlled Optimized (C3), a set of MR dampers with behavior formulated via the modified Bouc-Wen rheological model and controlled through the Linear Quadratic Regulator associated with the Clipped Optimal control strategy (LQR-CO) is applied to the structure. …”
Get full text
Article -
16660
Monitoring Murder Crime in Namibia Using Bayesian Space-Time Models
Published 2012-01-01“…The model consists of carefully chosen prior and hyper-prior distributions for parameters and hyper-parameters, with inference conducted using Gibbs sampling algorithm and sensitivity test for model validation. …”
Get full text
Article