-
1101
ARIMA-Based Forecasting of Wastewater Flow Across Short to Long Time Horizons
Published 2025-06-01“…Improving urban wastewater treatment efficiency and quality is urgent for most cities. …”
Get full text
Article -
1102
Retracted: Computer Medical Image Segmentation Based on Neural Network
Published 2020-01-01“…Image segmentation in medical imaging has long been a problem in radiological image processing. Most of the image segmentation methods in traditional vision algorithms are difficult to achieve high-resolution image segmentation due to the complexity of the algorithm. …”
Get full text
Article -
1103
Selection Based on Colony Fitness for Differential Evolution
Published 2018-01-01Get full text
Article -
1104
MULTIDIMENSIONAL ANALYSIS OF PHYSICOCHEMICAL TRANSFORMATIONS AND SENSORY ATTRIBUTES OF GREEN AND ROASTED COFFEE
Published 2024-06-01“…Utilizing a multi-objective optimization algorithm, Ethiopian coffee emerged as possessing the most optimal physicochemical characteristics. …”
Get full text
Article -
1105
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
1106
Novel method for robust bilateral filtering point cloud denoising
Published 2025-08-01“…Moreover, when compared to algebraic point set surfaces (APSS), robust implicit moving least squares (RIMLS), anisotropic weighted locally optimal projection (AWLOP), bilateral filtering, and guided filtering point cloud denoising algorithms, the proposed method consistently achieved the smallest MSE and the highest SNR in most cases on the dataset used in this study.…”
Get full text
Article -
1107
Inverse Kinematics of a 7-Degree-of-Freedom Robotic Arm Based on Deep Reinforcement Learning and Damped Least Squares
Published 2025-01-01“…In this paper, we propose a novel solution to the inverse kinematics problem by combining Proximal Policy Optimization (PPO) with the Damped Least Squares (DLS) method, forming the Multistep PPO-DLS Inverse Kinematics (MPDIK) algorithm. …”
Get full text
Article -
1108
Cost-effectiveness analysis of best management practices for non-point source pollution in watersheds: A review
Published 2017-03-01“…According to the accounting results, two optimization criteria, namely cost minimization and benefit maximization, were employed to screen for the most cost effective measures. …”
Get full text
Article -
1109
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
1110
Developing an Efficient Calibration System for Joint Offset of Industrial Robots
Published 2014-01-01“…Joint offset calibration is one of the most important methods to improve the positioning accuracy for industrial robots. …”
Get full text
Article -
1111
Bayesian Uncertainty Quantification of Reflooding Model With PSO–Kriging and PCA Approach
Published 2025-01-01“…As reflooding is a vital stage to cool the core and prevent serious accidents and uncertainties exist in the important results of the program because of the complexity of the phenomena, IUQ is performed for reflooding models in this study based on Bayesian theory and Markov chain Monte Carlo (MCMC) algorithm. In order to solve the problem of large time costs in sampling and inefficient use of transient sample points, particle swarm optimization (PSO)–Kriging model and principal component analysis (PCA) are adopted in this paper. …”
Get full text
Article -
1112
Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding
Published 2014-01-01“…The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. …”
Get full text
Article -
1113
Well logging super-resolution based on fractal interpolation enhanced by BiLSTM-AMPSO
Published 2025-05-01“…Specifically, mutation factors are introduced into the particle swarm optimization (PSO) algorithm to enhance search accuracy. …”
Get full text
Article -
1114
HUMAN-ORIENTED QUALITY MANAGEMENT SYSTEM OF ENTERPRISE: CONTROL OF NON-CONFORMING PRODUCT AND UTILIZATION
Published 2013-09-01“…The existing classifications and operation algorithms of the QMS basic types allow optimizing the processes of product improvement, and the quality of life of the system participants improvement. …”
Get full text
Article -
1115
Adaptive machine learning framework: Predicting UHPC performance from data to modelling
Published 2025-09-01“…Results showed outlier detection reduced extreme values, improving data distribution. LightGBM demonstrated the most stable performance among all models. …”
Get full text
Article -
1116
Bearing Fault Diagnosis in the Mixed Domain Based on Crossover-Mutation Chaotic Particle Swarm
Published 2021-01-01“…Finally, the support vector machine is optimized using the improved chaotic particle swarm to improve fault classification diagnosis. …”
Get full text
Article -
1117
Comparison of Spatial Predictability Differences in Truck Activity Patterns: An Empirical Study Based on Truck Tracking Dataset of China
Published 2025-01-01“…This research not only characterizes the freight truck community but also aids algorithm optimization by revealing predictability factors for real-world applications.…”
Get full text
Article -
1118
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
Get full text
Article -
1119
A multi-dimensional data-driven ship roll prediction model based on VMD-PCA and IDBO-TCN-BiGRU-Attention
Published 2025-06-01“…Finally,the improved dung beetle optimization (IDBO) algorithm is used to optimize the hyper-parameters of the model. …”
Get full text
Article -
1120
Address Translation in a Compositional Microprogram Control Unit
Published 2025-06-01“…The method proposed in the article is based on the adaptation of algorithms for optimizing microprogram automata circuits to the features of CMCUs. …”
Get full text
Article