-
18521
Remote Minimally Invasive Surgery – Haptic Feedback and Selective Automation in Medical Robotics
Published 2011-01-01“…We propose a XFEM-based incision force prediction algorithm that simulates the incision contact-forces in real-time and compensates the delayed force sensor readings. …”
Get full text
Article -
18522
Advanced retinal disease detection from OCT images using a hybrid squeeze and excitation enhanced model.
Published 2025-01-01“…<h4>Results</h4>The combined features from EfficientNetB0 and Xception are processed via fully connected layers and categorized using the Softmax algorithm. The methodology was tested on UCSD and Duke's OCT datasets and produced excellent results. …”
Get full text
Article -
18523
Design of an Incremental Music Teaching and Assisted Therapy System Based on Artificial Intelligence Attention Mechanism
Published 2022-01-01“…In this paper, from algorithm design to experimental validation, both in terms of accuracy, the operational difficulty of the experiment, consumption of arithmetic power, and time cost, the unique superiority of the artificial intelligence attention-based combined with incremental music teaching adjunctive therapy system proposed in this paper can be seen in the MS lesion segmentation task.…”
Get full text
Article -
18524
Fleet Management for HDVs and CAVs on Highway in Dense Fog Environment
Published 2020-01-01“…As to improve the traffic flow throughput and driving safety in dense fog weather condition on highway, this paper uses a mathematical modeling method to study and control the fleet mixed with human-driven vehicles (HDVs) and connected automatic vehicles (CAVs) in dense fog environment on highway based on distributed model predictive control algorithm (DMPC), along with considering the car-following behavior of HDVs driver based on cellular automatic (CA) model. …”
Get full text
Article -
18525
FEATURES OF FORMING MARKETING OF AN ECO-ORIENTED ENTERPRISE
Published 2023-12-01“…The formation of environmental marketing at the enterprise is based on the algorithm of individual consecutive steps. It helps ensure the satisfaction of consumer needs maintaining environmental balance and public health. …”
Get full text
Article -
18526
Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials
Published 2018-01-01“…The calculations performed have allowed finding an analytical solution which was compared with numerical solutions obtained by using the shooting method and the fourth-order Runge-Kutta algorithm. These analytical and numerical results have shown that the values of tangential stresses are greater than the radial stresses. …”
Get full text
Article -
18527
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. …”
Get full text
Article -
18528
Fast Detection of Deceptive Reviews by Combining the Time Series and Machine Learning
Published 2021-01-01“…Secondly, a co-training two-view semisupervised learning algorithm was performed in each captured interval, in which linguistic cues, metadata, and user purchase behaviors were synthetically employed to classify the reviews and check whether they are spam ones or not. …”
Get full text
Article -
18529
ANALYSIS OF THE PRESSURE DISTRIBUTION ON RAIL SEAT OF CONCRETE SLEEPERS UNDER 40- TONNE AXLE LOAD
Published 2016-01-01“…The FE model is first validated by comparing the calculated results with those of a traditional simplified algorithm. More results have shown that( 1) the typical heavy haul track structure in China can meet the requirements of 40- tonne axle load,but the stress on the top of subgrade exceeds the bearing capacity considered in normal design;( 2) with the increase of the lateral wheel-rail contact force,the width( along the lateral) of the contact patch between the railpad and the sleeper decreases and the length keeps almost unchanged,thereby the maximum pressure increases and its location moves towards the field side in the lateral;( 3) Under the typical wheel-rail contact forces,the pressure distribution on the rail seat changes significantly when the stiffness of the railpad increases from 80 MN / m to 200 MN / m,while un-affected as the stiffness further increases to 1300 MN / m;( 4) Assuming a constant dynamic amplification factor,the pressure on the rail seat decreases as the rail fastening system fails,and correspondingly,the shape of contact patch between the rail pad and the sleeper becomes more irregular due to less constraints.…”
Get full text
Article -
18530
ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF
Published 2025-01-01“…Our results show that ESX’s rule-mining algorithm achieves over 99% accuracy in generating access control policies, using only 40% of the log entries for mining. …”
Get full text
Article -
18531
Recent Progress about Flight Delay under Complex Network
Published 2021-01-01“…This may be achieved by analyzing flight delay in frequency domain instead of time domain. (4) Summation of most critical nodes/edges may not be the most crucial group to network resilience or flight delay propagations. Effective algorithm for most influential sequence is to be developed.…”
Get full text
Article -
18532
Assessing Hydropower Potential in Nepal’s Sunkoshi River Basin: An Integrated GIS and SWAT Hydrological Modeling Approach
Published 2024-01-01“…The Sequential Uncertainty Fitting Version 2 (SUFI-2) algorithm, integrated within the SWAT Calibration and Uncertainty Program (SWAT-CUP), was employed to calibrate and validate the model. …”
Get full text
Article -
18533
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01“…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
Get full text
Article -
18534
Testing convolutional neural network based deep learning systems: a statistical metamorphic approach
Published 2025-01-01“…Furthermore, we also propose an MRs minimization algorithm for the CUT, thus saving computational costs and organizational testing resources.…”
Get full text
Article -
18535
Using the clustering method to find the final environmental parameters coefficients in road construction projects
Published 2025-02-01“…In the first phase, the Genetic Optimization Algorithm was implemented to determine convenient coefficients for the relevant parameters. …”
Get full text
Article -
18536
Effects of Regional Trade Agreement to Local and Global Trade Purity Relationships
Published 2020-01-01“…Here, we separate the influence of geographical distance, economic volume, and overall increase in transportation and labor costs and use the expectation maximization algorithm to optimize the parameters and quantify the trade purity indicator, which describes the true global trade environment and relationships among countries. …”
Get full text
Article -
18537
Deep learning models for detection of explosive ordnance using autonomous robotic systems: trade-off between accuracy and real-time processing speed
Published 2024-11-01“…The main contribution of this study is the results of a detailed evaluation of the YOLOv8 and RT-DETR models for real-time EO detection, helping to find trade-offs between the speed and accuracy of each model and emphasizing the need for special datasets and algorithm optimization to improve the reliability of EO detection in autonomous systems.…”
Get full text
Article -
18538
Extreme‐Event Magnetic Storm Probabilities Derived From Rank Statistics of Historical Dst Intensities for Solar Cycles 14–24
Published 2021-04-01“…Three different models are fitted to the cycle‐ranked −Dst1 and −Dst2 values using a maximum‐likelihood algorithm: A Gumbel model, an unconstrained Generalized‐Extreme‐Value model, and a Weibull model constrained to have a physically justified maximum storm intensity of −Dstm = 2500 nT. …”
Get full text
Article -
18539
Global foot-and-mouth disease risk assessment based on multiple spatial analysis and ecological niche model
Published 2025-12-01“…This study utilized multi-distance spatial cluster analysis, kernel density analysis, directional distribution analysis to investigate the spatial distribution patterns of historical FMD epidemics. A multi-algorithm ensemble model considering climatic, geographic, and social factors was developed to predict the suitability area for FMDV, and then risk maps of FMD for each species of livestock were generated in combination with the distribution of livestock. …”
Get full text
Article -
18540
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01“…The security of the presumptive algorithm to be more efficient in front of the security challenges facing cloud computing. …”
Get full text
Article