-
821
-
822
Fault Diagnosis Method of Wind Turbine Pitch Angle Based on PCA-KNN Fusion Algorithm
Published 2021-11-01Get full text
Article -
823
Estimation of Tree Canopy Closure Based on U-Net Image Segmentation and Machine Learning Algorithms
Published 2025-05-01Get full text
Article -
824
Monitoring land subsidence through improved CAESAR algorithm in time-series InSAR processing
Published 2024-01-01Get full text
Article -
825
Novel fruit fly algorithm for global optimisation and its application to short-term wind forecasting
Published 2019-07-01“…In order to overcome the shortcoming and improve the precision of solution, we propose a new fruit fly optimisation algorithm (SEDMFOA) based on spatial expansion and dynamic mutation. …”
Get full text
Article -
826
-
827
FF-YOLO: An Improved YOLO11-Based Fatigue Detection Algorithm for Air Traffic Controllers
Published 2025-07-01Get full text
Article -
828
Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm
Published 2022-12-01“…Meta-heuristic-based search methods are suitable for solving these problems. Therefore, the main contribution of this paper is to use the high ability of the cheetah optimization algorithm (CHOA) to optimally extract CNN hyper-parameters. …”
Get full text
Article -
829
Neural network algorithm for optical-SAR image registration based on a uniform grid of points
Published 2024-08-01Get full text
Article -
830
Machine learning applications in river research: Trends, opportunities and challenges
Published 2022-11-01“…In contrast, river researchers have had few applications in multiclass and multilabel algorithm, associate rule and Naïve Bayes. …”
Get full text
Article -
831
Aspect-Based Sentiment Analysis with LDA and IndoBERT Algorithm on Mental Health App: Riliv
Published 2025-03-01“…This study used 3068 reviews from September 2015 to December 2024. The main results obtained were 1) Identified the sentiment that positive is highest in 2020, neutral is highest in 2020, and negative is highest in 2018. 2) Identified 4 main aspects of the Riliv application: Access Support, Counseling Services, Meditation Features, and User Interface with LDA. 3) The majority distribution was negative on User Interface, neutral on Counseling Services, and positive on Meditation Features. 4) The effectiveness of IndoBERT compared to the non-transformer baseline algorithm. 5) The most optimal results were obtained with 70% training, 10% validation, and 20% testing, resulting in 95% accuracy.…”
Get full text
Article -
832
High resolution weld semantic defect detection algorithm based on integrated double U structure
Published 2025-05-01Get full text
Article -
833
-
834
-
835
Seismic Behavior of a Timber Structure Based on a Soft-Kill BESO Optimization Algorithm
Published 2025-03-01“…Analysis results show that wood braced-frame structures with low structural redundancy (and fewer main joints to dissipate energy), such as those obtained from topology optimization algorithms, exhibit a markedly brittle behavior with almost no displacement ductility. …”
Get full text
Article -
836
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
837
-
838
Research and Application of Parabolic Sun-tracking System Based on PLC
Published 2020-11-01Get full text
Article -
839
A Two-Criteria Weather Routing Method Based on Neural Network and A-star Algorithm
Published 2024-05-01“…Test results show that the proposed algorithm operates reliably and has low errors. This research can be applied to find the optimal routes for small and medium-sized ships in Vietnam before each voyage at a low cost instead of using high-cost weather routing services.…”
Get full text
Article -
840