-
7421
Energy-Efficient Power Optimization with Spectrum Sensing Errors in OFDMA Cognitive Opportunistic Relay Links
Published 2016-02-01“…We propose a novel algorithm to optimize the energy efficiency (EE) of OFDM-based cognitive opportunistic relaying links (CORL) under secondary users (SUs) incorrectly sensing the unlicensed spectrum. …”
Get full text
Article -
7422
Phononic First Band Gap of Quaternary Layered Periodic Structure with the Lumped-Mass Method
Published 2014-01-01“…Existing band gap analysis is mostly focused on the binary structure, while the researches on the quaternary layered periodic structure are still lacking. …”
Get full text
Article -
7423
Decoding breast cancer heterogeneity: a novel three-gene signature links intratumoral heterogeneity with tumor microenvironment and patient outcomes
Published 2025-07-01“…Abstract Breast cancer remains a leading cause of cancer-related mortality worldwide, with intratumoral heterogeneity (ITH) emerging as a critical determinant of treatment outcomes. While ITH’s role in therapeutic resistance is increasingly recognized, its interactions with the tumor microenvironment and potential as a prognostic biomarker remain insufficiently explored. …”
Get full text
Article -
7424
Development of YOLO-Based Mobile Application for Detection of Defect Types in Robusta Coffee Beans
Published 2025-01-01“…The method employed in this study is YOLO, a deep learning-based object detection algorithm known for its real-time object detection capabilities. …”
Get full text
Article -
7425
Target Detection Using Nonsingular Approximations for a Singular Covariance Matrix
Published 2012-01-01“…An improvement for the SMT algorithm is suggested.…”
Get full text
Article -
7426
Secondary School Students’ Perceptions of Subjects in Integrated STEM Teaching
Published 2025-06-01“…The results reveal that students perceive the subjects differently, but similarities can also be identified. While subject-specific content is perceived—such as the use of maps in geography, the calculation of volumes in mathematics, and Dijkstra’s algorithm in computer science—methodological connections, such as calculating, analyzing diagrams, or solving problems, are anchored across disciplines. …”
Get full text
Article -
7427
Lightcone bounds for quantum circuit mapping via uncomplexity
Published 2024-11-01“…We also develop an initial placement algorithm based on graph similarity search, aiding us in optimally placing circuit qubits onto a device. 600 realistic benchmarks using the IBM Qiskit compiler and a brute-force method are then tested against the lightcone bound, with results unambiguously verifying the veracity of the bound, while permitting trustworthy estimations of minimal overhead in near-term realizations of quantum algorithms. …”
Get full text
Article -
7428
A Hybrid MCDM-Grey Wolf Optimizer Approach for Multi-Objective Parametric Optimization of μ-EDM Process
Published 2023-12-01“…Feed rate, capacitance, and voltage were selected as the machining control parameters, while material removal rate, surface roughness, and tool wear ratio were selected as the responses. …”
Get full text
Article -
7429
Tree inventory analysis using AI and GIS in Uzbekistan: A case study from Tashkent
Published 2025-01-01“…The results show substantial variation in tree density, with Yunusobod district demonstrating the highest tree count and detection accuracy, while Chilonzor and Yakkasaroy faced marginally lower accuracy rates. …”
Get full text
Article -
7430
Assessing distortion in carbon fiber woven fabrics based on machine vision
Published 2025-12-01“…We developed the Light Transmission Algorithm (LT) analyzing voids at fiber tow intersections to calculate void-to-fabric ratios, providing qualitative and quantitative distribution indicators. …”
Get full text
Article -
7431
Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method
Published 2025-01-01“…Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera. …”
Get full text
Article -
7432
Isolated Handwritten Pashto Character Recognition Using a K-NN Classification Tool based on Zoning and HOG Feature Extraction Techniques
Published 2021-01-01“…K-nearest neighbors is considered as a classification tool for the proposed algorithm based on the proposed feature sets. A resultant accuracy of 80.34% is calculated for the histogram of oriented gradients, while for zoning-based density features, 76.42% is achieved using 10-fold cross validation.…”
Get full text
Article -
7433
Maintaining the coverage of a satellite multibeam hybrid reflector antenna by monitoring the current reflector state using signals of on-ground beacon
Published 2024-01-01“…Yet because solar heat flux falls onto reflector at different angles while satellite moves, the profile of the reflector undergoes cyclic distortions affecting both the position and gain of the beams. …”
Get full text
Article -
7434
HairSplitter: haplotype assembly from long, noisy reads
Published 2024-10-01“…On noisy long reads, HairSplitter recovers more strains while being faster than state-of-the-art tools, both in the cases of viruses and bacteria. …”
Get full text
Article -
7435
NCG-TSM: A Noncooperative Game for the Taxi Sharing Model in Urban Road Networks
Published 2023-01-01“…Taxi sharing is a promising method to save resource consumption and alleviate traffic congestion while satisfying people’s commuting needs. Existing research methods include taxi dispatching methods based on intelligent algorithms, single vehicle route recommendation algorithms, and route recommendation algorithms based on vehicle traffic history. …”
Get full text
Article -
7436
Using Artificial Neural Networks to Evaluate the Capacity and Cost of Multi-Fiber Optical Backbone Networks
Published 2024-11-01“…Furthermore, a fiber assignment algorithm is also proposed to complement the network design, enabling the generation of datasets for training and testing of the developed ANN model. …”
Get full text
Article -
7437
Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption
Published 2025-03-01“…It employs the Paillier homomorphic encryption algorithm to update transaction amounts and uses the FO commitment-based zero-knowledge proof scheme to validate transaction legality. …”
Get full text
Article -
7438
Automation of reversible steganographic coding with nonlinear discrete optimisation
Published 2022-12-01“…Experimental results validate the near-optimality of the proposed optimisation algorithm when benchmarked against a brute-force method.…”
Get full text
Article -
7439
Electric Vehicle Cluster and Scheduling Strategy Based on Dynamic Game
Published 2023-04-01“…Simulation results of the dispatching strategy show that the peak-to-valley ratio decreased by 13.22%,which indicates that the EVA can effectively reduce its own operating costs while meeting the peak shaving requirements of the power grid, and vehicle owners can obtain benefits from participating in the peak shaving process.…”
Get full text
Article -
7440
Flood change detection model based on an improved U-net network and multi-head attention mechanism
Published 2025-01-01“…Additionally, the developed model achieves an accuracy of 90.11% while maintaining a loss value of approximately 0.59, whereas other model algorithms exceed a loss value of 0.74. …”
Get full text
Article