-
7261
An artificial neural network approach to comparative aspects: A predictive analysis of magnetic dipole on the heat transfer of maxwell hybrid nano coolants flow in an inclined cyli...
Published 2025-04-01“…This predictive analysis optimizes engine cooling and lubrication under varying thermal and flow conditions. …”
Get full text
Article -
7262
Effect of tool angle in nanocutting of single crystal GaN using diamond cutter
Published 2025-06-01“…Large-scale MD simulations are meticulously performed to model the nanoscale cutting process of single-crystal GaN using a diamond tool. …”
Get full text
Article -
7263
Recent advances in machine learning applications for MXene materials: Design, synthesis, characterization, and commercialization for energy and environmental applications
Published 2025-07-01“…Recent studies confirm that ML models have been instrumental in improving MXene synthesis processes, enabling higher yields and optimization of properties, better purity, and scalability through real-time process control and reinforcement learning. …”
Get full text
Article -
7264
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
7265
Linear Continuous-Time Regression and Dequantizer for Lithium-Ion Battery Cells with Compromised Measurement Quality
Published 2025-02-01“…This paper presents two modular algorithms to improve data quality and enable fast, robust parameter identification. …”
Get full text
Article -
7266
Automated classification of oral potentially malignant disorders and oral squamous cell carcinoma using a convolutional neural network framework: a cross-sectional studyResearch in...
Published 2025-07-01“…Methods: This study assessed a dataset of 778 clinical images of OPMD and OSCC, divided into training, model optimization, and internal testing subsets with an 8:1:1 proportion. …”
Get full text
Article -
7267
Identifying and Validating an Acidosis-Related Signature Associated with Prognosis and Tumor Immune Infiltration Characteristics in Pancreatic Carcinoma
Published 2021-01-01“…The least absolute shrinkage and selection operator (LASSO) Cox regression was used to establish the optimal model. The tumor immune infiltrating pattern was characterized by the single-sample gene set enrichment analysis (ssGSEA) method, and the prediction of immunotherapy responsiveness was conducted using the tumor immune dysfunction and exclusion (TIDE) algorithm. …”
Get full text
Article -
7268
Emerging trends in sustainable energy system assessments: integration of machine learning with techno-economic analysis and lifecycle assessment
Published 2025-01-01“…TEA and LCA methods are enhanced through ML’s predictive modeling, optimization algorithms, and data analysis capabilities, providing more precise and efficient evaluations of SES. …”
Get full text
Article -
7269
Advancing soil mapping and management using geostatistics and integrated machine learning and remote sensing techniques: a synoptic review
Published 2025-07-01“…Future research should focus on improving model accuracy, interpretability, transparency, and explainability. …”
Get full text
Article -
7270
ES-UNet: efficient 3D medical image segmentation with enhanced skip connections in 3D UNet
Published 2025-08-01“…Conclusion ES-UNet integrates architectural and algorithmic improvements to achieve robust 3D medical image segmentation. …”
Get full text
Article -
7271
Enhancing Yield Estimation and Field Zoning Accuracy in Precision Agriculture Using Solar-Powered Drone-Based Remote Sensing
Published 2025-01-01“…The system processes this data using advanced machine learning algorithms to forecast crop yields and generate detailed field zoning maps, enabling optimized resource allocation and improved farm management. …”
Get full text
Article -
7272
LSTM-Enhanced Deep Reinforcement Learning for Robust Trajectory Tracking Control of Skid-Steer Mobile Robots Under Terra-Mechanical Constraints
Published 2025-05-01“…Four state-of-the-art DRL algorithms, i.e., Proximal Policy Optimization (PPO), Deep Deterministic Policy Gradient (DDPG), Twin Delayed DDPG (TD3), and Soft Actor–Critic (SAC), are selected to evaluate their ability to generate stable and adaptive control policies under varying environmental conditions. …”
Get full text
Article -
7273
Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence
Published 2025-06-01“…Globally, enterprises are undergoing significant transformation in line with developments based on industrial revolution by leveraging extensive computing resources, data capture technologies, information processing systems, and advanced data science models that span analytics, optimization, and algorithmic intelligence. …”
Get full text
Article -
7274
An upgraded high-precision gridded precipitation dataset for the Chinese mainland considering spatial autocorrelation and covariates
Published 2025-08-01“…Specifically, it achieves a mean absolute error of 1.48 mm d<span class="inline-formula"><sup>−1</sup></span> and a Kling-Gupta efficiency of 0.88, representing improvements of 12.84 % and 12.86 %, respectively, compared to the previously optimal dataset. …”
Get full text
Article -
7275
An enhanced substation equipment detection method based on distributed federated learning
Published 2025-05-01“…We propose CWA-YOLO, a detection framework integrating multi-scale feature fusion and an enhanced small-object detection head into YOLOv8 to improve accuracy across variable conditions. Additionally, a federated learning (FL) system tailored for substations enables collaborative model training without centralized data sharing, addressing privacy concerns and data heterogeneity. …”
Get full text
Article -
7276
Numerical Methodology for Enhancing Heat Transfer in a Channel with Arc-Vane Baffles
Published 2025-03-01“…The calculations utilize the finite volume method, and the SIMPLE algorithm is executed with the QUICK scheme. For the analysis of turbulent flow, the finite volume method with the Renormalization Group (RNG) <i>k-ε</i> turbulence model was used. …”
Get full text
Article -
7277
Randomization-Driven Hybrid Deep Learning for Diabetic Retinopathy Detection
Published 2025-01-01“…We enhance the model’s diagnostic capability through complex image preprocessing techniques, such as improved noise reduction and morphological approaches. …”
Get full text
Article -
7278
PhA-MOE: Enhancing Hyperspectral Retrievals for Phytoplankton Absorption Using Mixture-of-Experts
Published 2025-06-01“…Notably, this study marks the first application of a machine learning–based MOE model to real PACE-OCI hyperspectral imagery, validated using match-up field data. …”
Get full text
Article -
7279
The unwell patient with advanced chronic liver disease: when to use each score?
Published 2025-07-01“…Incorporating artificial intelligence to personalise predictive algorithms may provide the most effective prognostication for all clinical phenotypes. …”
Get full text
Article -
7280
Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply
Published 2018-09-01“…Aiming at the problems of low resource utilization rate,high energy consumption and poor user service quality in the existing virtualized Cloud Radio Access Network,an energy-aware virtualized resource allocation mechanism with hybrid energy supply was proposed.According to the energy sources and energy consumption of different network devices,energy arrival and energy consumption models were established.Furthermore,under the premise of guaranteeing the quality of user services,considering proportional fairness and energy consumption optimization,distributed algorithms based on asynchronous update were used to allocate resources and harvested energy for different types of virtual cloud radio access networks and user virtual base stations to effectively improve the energy efficiency of network.The simulation results show that the proposed resource allocation mechanism can reduce energy consumption while effectively reducing the latency and improving the throughput.…”
Get full text
Article