-
5901
Two-stage resilience enhancement method for integrated electricity-gas systems through linepack and mobile compressors
Published 2025-07-01“…The proposed method is reformulated into a mixed-integer second-order cone programming model using second-order cone relaxation. The progressive hedging algorithm is employed to further improve the solution efficiency. …”
Get full text
Article -
5902
Research on Book Recommendation Integrating Book Category Features and User Attribute Information
Published 2025-01-01“…Aiming at the problem of poor recommendation effect caused by data sparsity in traditional collaborative filtering algorithm in book recommendation, this study proposes a personalized recommendation model (BCF-UAI) that combines book category features and user attribute information, aiming to improve the accuracy and generalization ability of the recommendation system. …”
Get full text
Article -
5903
Hunting Stability Enhancement of a Train Bogie Employing Inerter-Based Suspension Mechanism
Published 2025-01-01“…The structural parameter analysis of inerter-based suspension mechanism is conducted, and the structural parameters are optimized using the nondominated sorting whale optimization algorithm (NSWOA). …”
Get full text
Article -
5904
Protein docking by the underestimation of free energy funnels in the space of encounter complexes.
Published 2008-10-01“…This algorithm explores the free energy surface spanned by encounter complexes that correspond to local free energy minima and shows similarity to the model of macromolecular association that proceeds through a series of collisions. …”
Get full text
Article -
5905
Research on detection and tracking methods of unmanned ship water targets based on light vision
Published 2024-12-01“…In terms of target detection, the YOLOv7 algorithm is used, which effectively improves the accuracy and recall rate of target detection by optimizing the loss function. …”
Get full text
Article -
5906
User Handover Aware Hierarchical Federated Learning for Open RAN-Based Next-Generation Mobile Networks
Published 2025-01-01“…To address these challenges, we propose MHORANFed, a novel optimization algorithm tailored to minimize learning time and resource usage costs while preserving model performance within a mobility-aware hierarchical FL framework for O-RAN. …”
Get full text
Article -
5907
Automatic text generation system for endangered languages based on conditional generative adversarial networks
Published 2025-12-01“…Future research directions include optimizing CGAN parameters using algorithms like particle swarm optimization, refining discriminator outputs in loss calculations, and incorporating cultural and linguistic features specific to endangered languages to improve the quality of the generated texts.…”
Get full text
Article -
5908
Experimental Study on Evaluation of Organization Collaboration in Prefabricated Building Construction
Published 2025-02-01“…The knowledge-driven part of this evaluation system used an evaluation model based on the analytic hierarchy process (AHP), while the data-driven part used a prediction model based on the BO-XGBoost algorithm to verify the validity of the AHP-based model. …”
Get full text
Article -
5909
Complex Large-Deformation Multimodality Image Registration Network for Image-Guided Radiotherapy of Cervical Cancer
Published 2024-12-01“…The model performs multiple registrations from local to global regions. …”
Get full text
Article -
5910
Stroke Risk Classification Using the Ensemble Learning Method of XGBoost and Random Forest
Published 2025-06-01“…This study proposes a stroke risk classification model using ensemble learning that combines Random Forest and XGBoost algorithms. …”
Get full text
Article -
5911
Privacy-preserving federated learning framework with dynamic weight aggregation
Published 2022-10-01“…There are two problems with the privacy-preserving federal learning framework under an unreliable central server.① A fixed weight, typically the size of each participant’s dataset, is used when aggregating distributed learning models on the central server.However, different participants have non-independent and homogeneously distributed data, then setting fixed aggregation weights would prevent the global model from achieving optimal utility.② Existing frameworks are built on the assumption that the central server is honest, and do not consider the problem of data privacy leakage of participants due to the untrustworthiness of the central server.To address the above issues, based on the popular DP-FedAvg algorithm, a privacy-preserving federated learning DP-DFL algorithm for dynamic weight aggregation under a non-trusted central server was proposed which set a dynamic model aggregation weight.The proposed algorithm learned the model aggregation weight in federated learning directly from the data of different participants, and thus it is applicable to non-independent homogeneously distributed data environment.In addition, the privacy of model parameters was protected using noise in the local model privacy protection phase, which satisfied the untrustworthy central server setting and thus reduced the risk of privacy leakage in the upload of model parameters from local participants.Experiments on dataset CIFAR-10 demonstrate that the DP-DFL algorithm not only provides local privacy guarantees, but also achieves higher accuracy rates with an average accuracy improvement of 2.09% compared to the DP-FedAvg algorithm models.…”
Get full text
Article -
5912
A novel LSTPA methodology for managing energy in electrical/thermal microgrids through CHP, battery resources, thermal storage, and demand-side strategies
Published 2025-03-01“…Abstract This paper presents a stochastic optimization model for integrated energy management in electrical and thermal microgrids, addressing uncertainties in renewable energy resources. …”
Get full text
Article -
5913
Unmet needs in the clinical management of chronic hepatitis B infection
Published 2025-06-01“…This includes efforts to optimize delivery of perinatal HBV care, improve HBV-related hepatocellular carcinoma risk stratification models, and clarify the role of finite therapy in the HBV treatment algorithm. …”
Get full text
Article -
5914
Communication between nodes in backscatter-assisted wireless powered communication network
Published 2021-06-01“…At present, there is almost no design on information transmission between the nodes in wireless powered communication network.The high-throughput information transmission between the nodes in backscatter assisted wireless powered communication network was studied.A scheme was proposed which consisted of backscattering/energy transmission phase and active communication phase.The maximum throughput was modeled as a convex optimization problem.Then, based on the relationship between the total backscatter communication duration and the threshold of node energy capture duration, the problem was decomposed into several sub problems that only need to optimize two backscatter durations.An efficient two-level golden section search algorithm was designed to solve the sub problems, and the optimal solution of the original problem was obtained from the optimal solutions of the sub problems.Simulation results show that, compared with pure active communication scheme and pure backscatter communication scheme, the proposed scheme can effectively improve the throughput.…”
Get full text
Article -
5915
Two-stage denoising method for complex underground tunnel scene three-dimensional point clouds
Published 2025-06-01“…When the angle threshold is less than 1°, the optimal denoising effect can be achieved. Through the two-stage optimization algorithm, effective repair of surface holes on the tunnel is achieved. …”
Get full text
Article -
5916
Real-Time Recognition of Loading Cycles’ Process Based on Electric Mining Shovel Monitoring
Published 2022-01-01“…Moreover, the dynamic time warping (DTW) algorithm was used to detect and classify the preliminary recognition results by optimizing its distance threshold parameters, reducing the error rate of the model. …”
Get full text
Article -
5917
From Tables to Computer Vision: Transforming HPDC Process Data into Images for CNN-Based Deep Learning
Published 2025-06-01“…Utilizing a combination of statistical pre-processing, intelligent generative models, visual data transformations and deep learning, the methodology offers a comprehensive approach to enhancing production efficiency, ensuring superior process control and improving the quality of HPDC products. …”
Get full text
Article -
5918
Design and Implementation of Local Threshold Segmentation Based on FPGA
Published 2022-01-01“…Finally, the design algorithm is verified by ModelSim simulation software and QT5 software. …”
Get full text
Article -
5919
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
5920
Design a low-noise 5GHz wideband microwave power amplifier using 90nm CMOS technology with area reduction employing an active inductor
Published 2025-07-01“…We got these results: With an NF of 1.308 and an ideal power usage of 2.64 mW, we achieved an optimal gain of 27.21 dB(S2, 1). Our results show that evolutionary algorithms greatly improve LNA performance by pointing to the best settings for maximizing gain and reducing noise. …”
Get full text
Article