-
7301
Machine learning-based integration develops relapse related signature for predicting prognosis and indicating immune microenvironment infiltration in breast cancer
Published 2025-06-01“…To address these limitations, this study systematically analyzed RNA-seq high-throughput data and combined 10 machine learning algorithms to construct 117 models. The optimal algorithm combination, StepCox[both] and ridge regression, was identified, and an immune-related gene signature (IRGS) composed of 12 genes was developed. …”
Get full text
Article -
7302
Research on Status Assessment and Operation and Maintenance of Electric Vehicle DC Charging Stations Based on XGboost
Published 2024-10-01“…The training sample data are established using historical data, online monitoring data, and external environmental data, and the charging station status evaluation model is trained using the XGBoost algorithm. Based on the condition assessment results, a risk assessment model is established in combination with fault parameters. …”
Get full text
Article -
7303
Overhead line path planning based on deep reinforcement learning and geographical information system
Published 2025-04-01“…Experimental verification of real data shows that compared with existing algorithms, the DSOP method is not only more consistent with the manual line selection effect (improved by more than 3%), but also has a high success rate. …”
Get full text
Article -
7304
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Methods A multi-layered design approach was adopted. PQC algorithms (e.g., CRYSTALS-Dilithium) were integrated at the blockchain consensus layer to resist quantum attacks. …”
Get full text
Article -
7305
Intelligent Data Reduction for IoT: A Context-Driven Framework
Published 2025-01-01“…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
Get full text
Article -
7306
Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems
Published 2020-01-01“…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
Get full text
Article -
7307
DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions
Published 2025-01-01“…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
Get full text
Article -
7308
City-scale industrial tank detection using multi-source spatial data fusion
Published 2024-12-01“…To address this, high-resolution remote sensing images and deep learning algorithms are used to improve the accuracy of industrial storage tank detection at the city scale. …”
Get full text
Article -
7309
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
7310
Advancements in Herpes Zoster Diagnosis, Treatment, and Management: Systematic Review of Artificial Intelligence Applications
Published 2025-06-01“…Medical images (9/26, 34.6%) and electronic medical records (7/26, 26.9%) were the most commonly used data types. Classification tasks (85.2%) dominated AI applications, with neural networks, particularly multilayer perceptron and convolutional neural networks being the most frequently used algorithms. …”
Get full text
Article -
7311
Recent technical advancements and clinical applications of MR-guided radiotherapy in lung cancer treatment
Published 2025-07-01“…Additionally, MRgRT could potentially allow multileaf collimator (MLC) tracking to further improve the treatment efficiency. Recent technological innovations, including AI-powered auto-contouring algorithms, deep-learning (DL) based prediction models, and adaptive treatment strategies, further optimize MRgRT by improving workflow efficiency and reducing treatment time. …”
Get full text
Article -
7312
Capacity-Constrained Contraflow Adaption for Lane Reconfiguration in Evacuation Planning
Published 2018-01-01“…This paper presents a heuristic contraflow-based reconfiguration evacuation algorithm, which is named Capacity-Constrained Contraflow Adaption (CC-Adap). …”
Get full text
Article -
7313
Space-time coding scheme for the paired weak user in MIMO-NOMA systems
Published 2018-06-01“…In view of the paired weak user’s poor outage performance in multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) systems,Alamouti code was adopted to encode for the weak user in order to improve its outage performance by means of diversity,and the closed-form expression of the strong user’s ergodic capacity as well as the boundary-form expressions of the weak user’s ergodic capacity and outage probability was derived in the proposed model.Moreover,a power allocation algorithm for optimizing the system’s throughput was proposed.Finally,the numerical results show the accuracy of the derived expressions,the efficacy of the proposed algorithm,and that the weak user’s outage performance in the proposed coding scheme is far superior to that in the current coding scheme only adopting vertical Bell lab layered space-time (V-BLAST) code.…”
Get full text
Article -
7314
Monitoring of Transformer Hotspot Temperature Using Support Vector Regression Combined with Wireless Mesh Networks
Published 2024-12-01“…Subsequently, this study employed a Support Vector Regression (SVR) algorithm to train the sample dataset, optimizing the SVR model using a grid search and cross-validation to enhance the predictive accuracy. …”
Get full text
Article -
7315
RRBM-YOLO: Research on Efficient and Lightweight Convolutional Neural Networks for Underground Coal Gangue Identification
Published 2024-10-01“…The lightweight module RepGhost, the repeated weighted bi-directional feature extraction module BiFPN, and the multi-dimensional attention mechanism MCA were integrated, and different datasets were replaced to enhance the adaptability of the model and improve its generalization ability. The findings from the experiment indicate that the precision of the proposed model is as high as 0.988, the mAP@0.5(%) value and mAP@0.5:0.95(%) values increased by 10.49% and 36.62% compared to the original YOLOv8 model, and the inference speed reached 8.1GFLOPS. …”
Get full text
Article -
7316
Heuristic thermal sensor allocation methods for overheating detection of real microprocessors
Published 2017-11-01“…On this basis, a heuristic method based on genetic algorithm is proposed to find a near‐optimal thermal sensor allocation solution, which can make overheating detection probability significantly improved with a greatly reduced execution time. …”
Get full text
Article -
7317
Combining Software-Defined and Delay-Tolerant Networking Concepts With Deep Reinforcement Learning Technology to Enhance Vehicular Networks
Published 2024-01-01“…The study assesses the performance of the multi-protocol approach using metrics: TTL, buffer management,link quality, delivery ratio, Latency and overhead scores for optimal network performance. Comparative analysis with single-protocol VANETs (simulated using the Opportunistic Network Environment (ONE)), demonstrate an improved performance of the proposed algorithm in all VANET scenarios.…”
Get full text
Article -
7318
Comparative Analysis of Machine Learning Techniques for Fault Diagnosis of Rolling Element Bearing with Wear Defects
Published 2025-03-01“…This optimization of the signal enhancement methodology significantly improved the fault diagnosis accuracy. …”
Get full text
Article -
7319
Predicting weather-related power outages in large scale distribution grids with deep learning ensembles
Published 2025-09-01“…This approach not only enhances prediction accuracy compared to individual learners but also improves the generalization ability and robustness of standalone DL models. …”
Get full text
Article -
7320
Predicting Diabetic Retinopathy and Nephropathy Complications Using Machine Learning Techniques
Published 2025-01-01“…This paper shows the possibility of machine learning based frameworks in diabetic complication management by predicting accurately and in time. These models can be integrated into clinical decision support systems (CDSS) to give insights to clinicians, improve patient outcomes through personalized interventions and optimize resource allocation. …”
Get full text
Article