-
7001
Improving data sharing and knowledge transfer via the Neuroelectrophysiology Analysis Ontology (NEAO)
Published 2025-05-01“…On the other hand, different software codes can implement the same analysis algorithm, while adopting different names to identify functions and parameters. …”
Get full text
Article -
7002
Dynamic emotion intensity estimation from physiological signals facilitating interpretation via appraisal theory.
Published 2025-01-01“…In our experiment, emotions of varying intensities are induced for three distinct qualities while physiological signals are measured, and participants assess their subjective feeling in real time. …”
Get full text
Article -
7003
Convergence Analysis for Differentially Private Federated Averaging in Heterogeneous Settings
Published 2025-02-01“…Federated learning (FL) has emerged as a prominent approach for distributed machine learning, enabling collaborative model training while preserving data privacy. However, the presence of non-i.i.d. data and the need for robust privacy protection introduce significant challenges in theoretically analyzing the performance of FL algorithms. …”
Get full text
Article -
7004
Bidding strategies for virtual power plants under the electricity-carbon joint market taking into account wind and solar uncertainties
Published 2025-05-01“…The upper level maximizes the VPP's profit, while the lower level maximizes social welfare in the joint market. …”
Get full text
Article -
7005
Sensor placement optimization for critical-grid coverage problem of indoor positioning
Published 2020-12-01“…As a conclusion, the proposed method could reduce the cost of sensor deployment while ensuring the accuracy of indoor positioning for critical areas. …”
Get full text
Article -
7006
Anomaly Detection Approach Based on Deep Neural Network and Dropout
Published 2020-06-01“…However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. …”
Get full text
Article -
7007
Distributed Event-Triggered-Based Adaptive Formation Tracking Control for Multi-UAV Systems Under Fixed and Switched Topologies
Published 2025-03-01“…Finally, the validity of the designed algorithm is confirmed by numerical examples and software-in-the-loop (SIL) simulation experiments.…”
Get full text
Article -
7008
Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders
Published 2024-04-01“…Experiments on public data sets and NS-3 simulation data sets show that while ensuring lightweight, the proposed model reduces the false negative rate by an average of 35.9% and 48% compared with the baseline method.…”
Get full text
Article -
7009
Hybrid modeling for optimizing electrospun polyurethane nanofibrous membranes in air filtration applications
Published 2025-07-01“…However, optimizing their structural characteristics to maximize filtration efficiency while minimizing pressure drop remains challenging due to the complexity of the electrospinning process. …”
Get full text
Article -
7010
Accurate Solar Radiation Forecasting Through Feature-Enhanced Decision Trees and Wavelet Decomposition
Published 2025-01-01“…This study explores the efficacy of the decision tree algorithm in predicting solar power generation, addressing the inherent variability in photovoltaic (PV) energy production due to weather conditions. …”
Get full text
Article -
7011
Comparing the Effect of Age, Gender, and Desired Speed on Car-Following Behavior by Using Driving Simulator
Published 2021-01-01“…The CF model for each driver was calibrated by genetic algorithm. Gender and DS were effective in CF behavior, while the age factor was not. …”
Get full text
Article -
7012
Automatic speech analysis combined with machine learning reliably predicts the motor state in people with Parkinson’s disease
Published 2025-05-01“…Acoustic speech features were automatically extracted with the algorithm given by the Dysarthria Analyzer. Results suggest that acute levodopa intake improves phonatory-respiratory speech functions and speech planning abilities, while the articulatory system remains unaffected. …”
Get full text
Article -
7013
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
7014
Authentication of an Indonesian ID Card with Simultaneous NFC and Face Recognition
Published 2025-06-01“…The application, developed using Flutter, incorporates facial recognition for biometric verification, while NFC is employed as an additional authentication layer to provide dual-factor verification and reinforce identity security. …”
Get full text
Article -
7015
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“…The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms. …”
Get full text
Article -
7016
Development of View Optimization Techniques for Structural Monitoring Systems Using Post-Processing of Structural Analysis and Image Processing
Published 2025-01-01“…The proposed framework for view optimization utilized the results from structural analysis performed in ABAQUS to extract initial camera positions and direction vectors, which served as inputs for an optimization algorithm. The optimization process applied image processing methods to detect deformation areas, while performance was evaluated at each iteration and saved when improvements were found. …”
Get full text
Article -
7017
Retrospective Illumination Correction of Retinal Images
Published 2010-01-01“…Among the tested optimizers, the gradient-based optimizer with varying step has shown to have the fastest convergence while providing the best precision. The final algorithm proved to be able of suppressing approximately 70% of the artificially introduced non-homogenous illumination. …”
Get full text
Article -
7018
Intelligent CO2 Monitoring for Diagnosis of Sleep Apnea Using Neural Cryptography Techniques
Published 2022-01-01“…The accuracy of the GEP-KNN algorithm with different K values produced the highest accuracy at K=9 and k=10 of 95.12% and 95.67%; the lowest accuracy is K=1 of 65.34%.…”
Get full text
Article -
7019
Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models
Published 2024-01-01“…The paper explores the subject of data flow optimization using Fuzzy Assisted Cuckoo Search Optimization (FACSO), traffic flow using Gaussian Process Regression (GPR), and CH prediction using the Stochastic Optimization Algorithm (SOA). Optimizing network lifetime while minimizing Energy Consumption (EC) is feasible through the practical application of the SOA, GPR, and FACSO models. …”
Get full text
Article -
7020
Journalism’s transformation through digitalization in Turkey: Applying search engine optimization to journalism
Published 2022-12-01“…These discussions focus on how producing news by focusing on algorithms contradicts the professional principles of journalism. …”
Get full text
Article