Search alternatives:
improve model » improved model (Expand Search)
cost » most (Expand Search), post (Expand Search)
improve model » improved model (Expand Search)
cost » most (Expand Search), post (Expand Search)
-
7481
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
7482
Measurement Error Estimation Method of Field Service Electricity Energy Meters under the Condition of Big Data
Published 2022-10-01“…Firstly, the K-Means clustering algorithm is improved by optimizing the clustering evaluation index, and the field environmental data is analyzed by clustering. …”
Get full text
Article -
7483
Churn prediction for SaaS company with machine learning
Published 2025-06-01“…Design/methodology/approach – Through a preprocessing and normalization of data, seven machine learning algorithms were applied. The models were trained, and also cross-validation and parameter tuning techniques were applied to improve results. …”
Get full text
Article -
7484
Unraveling C-to-U RNA editing events from direct RNA sequencing
Published 2024-12-01“…Using in vitro synthesized and human ONT reads, our model optimizes the signal-to-noise ratio improving the detection of C-to-U editing sites with high accuracy, over 90% in all samples tested. …”
Get full text
Article -
7485
Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems
Published 2025-01-01“…A deep neural network model is subsequently trained to discover the relationships between the environmental parameters and optimized parameters to enable rapid adaptation to environmental conditions.…”
Get full text
Article -
7486
Digital Land Suitability Assessment for Irrigated Cultivation of Some Agricultural Crops Using Machine Learning Approaches (Case Study: Qazvin-Abyek)
Published 2024-09-01“…The utilization of modern mapping techniques such as digital soil mapping and machine learning algorithms can significantly improve the accuracy of land suitability assessment and crop performance prediction. …”
Get full text
Article -
7487
State-of-the-Art on IoV-Based Deep Learning Framework for Enhanced Driving Behavior Recognition: Recent Progress, Technology Updates, Challenges, and Future Direction
Published 2025-01-01“…However, these advanced algorithms still face several challenges. We analyze relevant literature from 2015 to 2024, to uncover key trends and gaps in the development of applications for identifying dangerous driving behaviors, with a primary focus on optimizing integration to improve the accuracy and real-time capability of driving behavior prediction. …”
Get full text
Article -
7488
Advanced Brain Tumor Segmentation With a Multiscale CNN and Conditional Random Fields
Published 2025-01-01“…The use of high-precision automatic algorithms for segmenting brain tumors has the potential to improve disease diagnosis, treatment monitoring, and large-scale pathological studies. …”
Get full text
Article -
7489
Enhancing Visual Perception in Immersive VR and AR Environments: AI-Driven Color and Clarity Adjustments Under Dynamic Lighting Conditions
Published 2024-11-01“…Future work will focus on extending the model’s capability to handle more complex lighting scenarios.…”
Get full text
Article -
7490
Enhancing action recognition in educational settings using AI-driven information systems for public health monitoring
Published 2025-07-01“…These limitations hinder their effectiveness, particularly in detecting health-related behaviors such as sedentary patterns, social interactions, and hygiene compliance.MethodsTo overcome these shortcomings, this research introduces an AI-driven information system that leverages advanced deep learning models and an Adaptive Knowledge Embedding Network (AKEN) to improve action recognition accuracy. …”
Get full text
Article -
7491
Quantum-Inspired Control Strategies for Reducing DC-Link Voltage Fluctuations in DFIG Wind Energy Converters
Published 2025-01-01“…By incorporating quantum-inspired algorithms into the Grid-Side Converter (GSC) control framework, the strategy dynamically adjusts PI gains using qubit-based probabilistic modeling—where control parameters exist simultaneously in multiple potential states, similar to quantum bits existing in both 0 and 1 states concurrently. …”
Get full text
Article -
7492
Prediction of alkali-silica reaction expansion of concrete using explainable machine learning methods
Published 2025-04-01“…This approach provides insights into the model’s decision-making process, clarifying the complex nature of machine learning algorithms. …”
Get full text
Article -
7493
Empowering Sustainability: The Crucial Role of IoT-Enabled Distributed Learning Systems in Reducing Carbon Footprints
Published 2025-01-01“…However, integrating IoT devices with distributed learning and multiple models significantly reduces energy consumption as well as the carbon footprint. …”
Get full text
Article -
7494
LSTM-Enhanced Deep Reinforcement Learning for Robust Trajectory Tracking Control of Skid-Steer Mobile Robots Under Terra-Mechanical Constraints
Published 2025-05-01“…Four state-of-the-art DRL algorithms, i.e., Proximal Policy Optimization (PPO), Deep Deterministic Policy Gradient (DDPG), Twin Delayed DDPG (TD3), and Soft Actor–Critic (SAC), are selected to evaluate their ability to generate stable and adaptive control policies under varying environmental conditions. …”
Get full text
Article -
7495
Disseminated intravascular coagulation
Published 2025-06-01“…Anticoagulant use has been extensively debated; however, the selection of optimal target patients could optimize their application and improve patient outcomes in the near future. …”
Get full text
Article -
7496
Research and application of mining AI video edge computing technology
Published 2024-12-01“…A lightweight software development kit (SDK) framework based on the register machine was proposed to decouple operators, improving the parallel computing ability of the algorithms and reducing the storage requirements of the SDK. …”
Get full text
Article -
7497
Machine learning for defect condition rating of wall wooden columns in ancient buildings
Published 2025-07-01“…The RBF neural network model achieved the highest accuracy (94.57 %) on the feature fusion dataset, while Grey Wolf Optimizer (GWO) optimization further improved accuracy to 96.74 %. …”
Get full text
Article -
7498
Lightweight deep neural network for contour detection and extraction of wheat spikes in complex field environments
Published 2025-08-01“…Results Independent test set validation shows the improved model achieves 83.9% contour integrity recognition rate and 92.4% mAP@0.5, exceeding baseline by 3.2 and 5.3% points respectively. …”
Get full text
Article -
7499
The Analysis of the Possibility to Conduct Orbital Manoeuvres of Nanosatellites in the Context of the Maximisation of a Specific Operational Task
Published 2025-05-01“…For example, slight adjustments to the altitude of the orbit with the use of Hohmann transfer proved to be optimal in terms of fuel costs. On the other hand, changes in inclination, although they are definitely energy-consuming, may significantly improve the coverage of the defined area. …”
Get full text
Article -
7500
Non-Destructive Detection of Silage pH Based on Colorimetric Sensor Array Using Extended Color Components and Novel Sensitive Dye Screening Method
Published 2025-01-01“…Forward and backward stepwise selection and support vector regression (SVR) were combined to create a sensitive dye screening method, which was used to determine the optimal sensitive dye. The variable combination population analysis–iteratively retains informative variables algorithm was iterated to optimize effective features. …”
Get full text
Article