-
3221
Water Quality Prediction Based on Hybrid Deep Learning Algorithm
Published 2023-01-01Get full text
Article -
3222
State of Charge Estimation for Li-Ion Batteries: An Edge-Based Data-Driven Approach
Published 2025-01-01Get full text
Article -
3223
An Intelligent Client Selection Algorithm of Federated Learning for Class-imbalance
Published 2024-04-01“… In the federated learning application scenario, if the data among the client devices shows the characteristics of non- independence identically distribution, or even class-imbalance, the optimization goal of the client local model will deviate from the global optimization goal, which brings great challenges to the performance of the global model. …”
Get full text
Article -
3224
Advanced clustering and transfer learning based approach for rice leaf disease segmentation and classification
Published 2025-07-01“…Also, the tent chaotic particle snow ablation optimizer is added into the learning process in order to improve the learning process and shorten the time of convergence. …”
Get full text
Article -
3225
Pricing principles in the field of ready–made meal delivery: analysis of influence factors
Published 2025-04-01“…The study describes the most popular pricing principles: cost–based, competitor–oriented, as well as dynamic algorithms taking into account seasonal demand. …”
Get full text
Article -
3226
YOLOX-S-TKECB: A Holstein Cow Identification Detection Algorithm
Published 2024-11-01“…Therefore, this paper proposes a cow identification method based on YOLOX-S-TKECB. (1) Based on the characteristics of Holstein cows and their breeding practices, we constructed a real-time acquisition and preprocessing platform for two-dimensional Holstein cow images and built a cow identification model based on YOLOX-S-TKECB. (2) Transfer learning was introduced to improve the convergence speed and generalization ability of the cow identification model. (3) The CBAM attention mechanism module was added to enhance the model’s ability to extract features from cow torso patterns. (4) The alignment between the apriori frame and the target size was improved by optimizing the clustering algorithm and the multi-scale feature fusion method, thereby enhancing the performance of object detection at different scales. …”
Get full text
Article -
3227
Design of task dividing and offloading algorithm in mobile edge computing
Published 2021-06-01Get full text
Article -
3228
A Global Path Planning Algorithm Based on Bidirectional SVGA
Published 2017-01-01“…This algorithm does not construct a visibility graph before the path optimization. …”
Get full text
Article -
3229
An improved hybrid approach involving deep learning for urban greening tree species classification with Pléiades Neo 4 imagery—A case study from Nanjing, Eastern China
Published 2025-12-01“…Future work will integrate multi-source data, multi-seasonal observations, and adaptive algorithms to further enhance classification performance and improve model robustness across diverse urban environments.…”
Get full text
Article -
3230
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
3231
Self-Supervised Social Recommendation Algorithm Fusing Residual Networks
Published 2024-12-01“…Experimental results show that the algorithm has good recommendation performance compared with the benchmark model.…”
Get full text
Article -
3232
A quadratic weighted centroid algorithm for tunnel personnel positioning
Published 2020-04-01“…By adopting a Gaussian filter model to improve the range accuracy of the received signal strength indicator algorithm and combining the centroid algorithm and weighting factor with a trilateration positioning model, a quadratic weighted centroid algorithm is proposed to improve the positioning accuracy of unknown positioning nodes. …”
Get full text
Article -
3233
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
3234
A Bi-Layer Collaborative Planning Framework for Multi-UAV Delivery Tasks in Multi-Depot Urban Logistics
Published 2025-07-01“…An improved particle swarm optimization (PSO) algorithm is proposed by integrating chaotic initialization, linearly adjusted acceleration coefficients and maximum velocity, a stochastic disturbance-based position update mechanism, and an adaptively tuned inertia weight to enhance algorithmic performance and path generation quality. …”
Get full text
Article -
3235
Radio Mean Labeling Algorithm, Its Complexity and Existence Results
Published 2025-06-01“…The existing ILP model does not guarantee that the vertex labels are distinct, positive and satisfy the radio mean condition, prompting the need for an improved approach. …”
Get full text
Article -
3236
Research on short-term traffic flow prediction based on the PCC-IGA-LSTM model
Published 2025-04-01“…To effectively address the spatial–temporal feature mining problem in short-term traffic flow prediction for complex road networks, a new method that combined the Pearson correlation coefficient (PCC) and improved genetic algorithm to optimize the long short-term memory model (IGA-LSTM) was constructed. …”
Get full text
Article -
3237
Two-stage robust planning for wind power-photovoltaic-thermal power-pumped storage-battery hybrid system
Published 2025-05-01“…The improved IEEE30-node system is followed to analyze the economics of the planning scheme under different conservative degrees, and the validity of the proposed model is verified.…”
Get full text
Article -
3238
A Flexible Interconnected Distribution Network Power Supply Restoration Method Based on E-SOP
Published 2025-02-01“…To solve this complex optimization model, an innovative hybrid approach combining the Improved Whale Optimization Algorithm (IWOA) with second-order cone programming is developed. …”
Get full text
Article -
3239
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…The results confirm the efficiency of the proposed feature selection method in improving Arabic Text Classification accuracy. Keywords: Arabic Natural Language Processing, Feature Selection, Firefly optimization method, Text Classification…”
Get full text
Article -
3240
AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection
Published 2025-05-01“…Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. …”
Get full text
Article