-
6581
Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
Published 2025-06-01“…Additionally, clustering algorithms enabled user segmentation based on cookie data, identification of behavioral patterns, enhanced personalized web recommendations, and browsing experience optimization. …”
Get full text
Article -
6582
Application of Adaptive Search Window-Based Nonlocal Total Variation Filter in Low-Dose Computed Tomography Images: A Phantom Study
Published 2024-11-01“…Computed tomography (CT) imaging using low-dose radiation effectively reduces radiation exposure; however, it introduces noise amplification in the resulting image. This study models an adaptive nonlocal total variation (NL-TV) algorithm that efficiently reduces noise in X-ray-based images and applies it to low-dose CT images. …”
Get full text
Article -
6583
Numerical analysis method of stress wave transmission attenuation of coal and rock structural plane
Published 2024-11-01“…The simulation and machine learning of stress wave transmission in the experimental process of Split Hopkinson Pressure Bar (SHPB) were carried out by combining the Barton-Bandis nodal ontology model, UDEC discrete element simulation and Gray Wolf Algorithm optimized BP neural network technology. …”
Get full text
Article -
6584
Arrears behavior prediction of power users based on BP neural network and multi-scale feature learning: a refined risk assessment framework
Published 2025-01-01“…A hierarchical neural network structure is designed to address the characteristics of different scales in distinct layers. Key model parameters are optimized, and a sensitivity analysis is conducted. …”
Get full text
Article -
6585
SwinFishNet: A Swin Transformer-based approach for automatic fish species classification using transfer learning.
Published 2025-01-01“…Images were preprocessed by resizing to 224 [Formula: see text] 224 pixels, normalizing, and converting to tensor format for compatibility with deep learning models. Transfer learning was applied using the ST, which was fine-tuned on these datasets and optimized with the AdamW algorithm. …”
Get full text
Article -
6586
Degree-Constrained k-Minimum Spanning Tree Problem
Published 2020-01-01“…Our numerical results indicate that the proposed models and algorithms allow obtaining optimal and near-optimal solutions, respectively. …”
Get full text
Article -
6587
Belief in building a full-fledged distance learning course in athletic training
Published 2025-06-01“…In particular, the experts mostly agreed with the logic and completeness of the course structure, the expediency of centralised content placement in the cloud environment, the optimality of the selected communication channels (email and cloud services), the clarity of the motor learning algorithm for remote performance by students, the adequacy of the proposed evaluation system and the presence of significant advantages in the use of tablets/smartphones in the educational process. …”
Get full text
Article -
6588
Architectural Gaps in Generative AI: Quantifying Cognitive Risks for Safety Applications
Published 2025-06-01“…<b>Methods</b>: This study investigates whether architectural design elements in Transformer-based generative models contribute to a measurable divergence from human reasoning. …”
Get full text
Article -
6589
Performance Analysis of MVDR Beamformer Applied on an End-fire Microphone Array Composed of Unidirectional Microphones
Published 2021-12-01“…Thirdly, we propose an adaptation of its adaptive algorithm during the pause of speech, which improves its robustness against the room reverberation and deviation from the optimal receiving direction. …”
Get full text
Article -
6590
Proactive dynamic flooding regulations for river basins in China’s arid and semi-arid region of Xinjiang
Published 2025-06-01“…We used an improved pre-release constraint algorithm, such as the long-short-series mean correction method, and evaluated the flood stage potential during the aforementioned three intervals. …”
Get full text
Article -
6591
Digital augmentation of aftercare for patients with anorexia nervosa: the TRIANGLE RCT and economic evaluation
Published 2025-07-01“…Outcome measures The effectiveness of ECHOMANTRA was evaluated at 12 and 18 months post randomisation. In addition to baseline recording, measures were collected monthly post randomisation to assist with data modelling and participant retention. …”
Get full text
Article -
6592
Automatic mosaic method of remote sensing images based on machine vision
Published 2024-10-01“…To address the above issues, this study proposes an improved remote sensing image mosaic model on the bias of the Scale Invariant Feature Transform (SIFT) algorithm. …”
Get full text
Article -
6593
Risk identification and assessment of Internet public opinion on public emergencies based on Bayesian network and association rule mining
Published 2025-07-01“…The core innovation lies in designing an improved scheme based on the CBA (Classification Based on Associations) algorithm to overcome the limitation of traditional association rule mining in handling non-Boolean data, thereby effectively extracting the correlations among public opinion risk factors to optimize the topological structure of the BN. …”
Get full text
Article -
6594
Data and Knowledge Dual-Driven Creep Life Prediction for Austenitic Heat-Resistance Steel
Published 2025-01-01“…In this study, we collected 216 creep data of austenitic heat-resistant steel, selected a variety of different machine learning algorithms to establish creep life prediction models, calculated and introduced a large amount of physical metallurgy knowledge highly related to creep based on Thermo-Calc, and converted the creep life into the form of the Larson–Miller parameter to optimize the data distribution, which effectively improved the prediction accuracy and interpretability of the model. …”
Get full text
Article -
6595
Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets
Published 2025-06-01“…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
Get full text
Article -
6596
Detecting Botrytis Cinerea Control Efficacy via Deep Learning
Published 2024-11-01“…Experimental results show that the validation loss of this method reaches 0.007, with a mean absolute error of 0.0148, outperforming other comparative models. This study enriches the theory of gray mold control and provides information technology for optimizing and selecting its inhibitors.…”
Get full text
Article -
6597
A growth posture identification method of immature peaches in natural environments
Published 2024-11-01“…The model was easily deployed with improved detection speed. …”
Get full text
Article -
6598
Privacy-Preserving Hierarchical Reinforcement Learning Framework for Task Offloading in Low-Altitude Vehicular Fog Computing
Published 2025-01-01“…At the local DRL level, we design an Attention-enhanced Federated Proximal Policy Optimization (AFedPPO) algorithm to enable decentralized training and execution (DTDE) for task offloading, which is privacy-preserving, effective, and scalable for the low-altitude VFC systems. …”
Get full text
Article -
6599
A Hierarchical Control Framework for Coordinating CAV-Dedicated Lane Allocation and Signal Timing at Isolated Intersections in Mixed Traffic Environments
Published 2025-01-01“…Compared with benchmark approaches, the model achieves an average improvement of 31.8% in traffic efficiency. …”
Get full text
Article -
6600
Research on machine vision online monitoring system for egg production and quality in cage environment
Published 2025-01-01“…The core of the system, an enhanced You Only Look Once Version 8-small (YOLOv8s) model, was augmented by substituting the Residual Network-18 backbone and integrating the Shuffle Attention mechanism, significantly improving egg detection precision. …”
Get full text
Article