-
10741
The impact of artificial intelligence on human resource management practices: An investigation
Published 2025-06-01“…These include potential biases within AI algorithms, concerns about data privacy and over-surveillance of employees, along with exacerbating the ‘digital divide’ between those with access to technology and those without. …”
Get full text
Article -
10742
Research Status and Progress of Acoustic Fire Extinguishing Technology
Published 2025-03-01“…Experimental results demonstrate that acoustic cavity focusing technology extends the effective fire suppression distance to 1.8 m while improving cooling efficiency by 10–20%. Integration with drone platforms and adaptive feedback systems enhances fire extinguishing energy efficiency by over 30%. …”
Get full text
Article -
10743
Model order reduction of boiler system using nature-inspired metaheuristic optimization of PID controller
Published 2025-04-01“…The HHO-based approach improves overall performance by 15%, while SSO significantly reduces computational complexity by 65% while maintaining 98% system accuracy. …”
Get full text
Article -
10744
A lightweight and optimized deep learning model for detecting banana bunches and stalks in autonomous harvesting vehicles
Published 2025-08-01“…Developing algorithms to identify fruit cutting locations is important for the functionality of harvesting robots. …”
Get full text
Article -
10745
Financial service composition with various privacy levels in multiple cloud environment
Published 2025-02-01“…To solve these challenges, a novel approach for financial service composition based on Quaternion Genetic Algorithms (QGA) is proposed. Our method optimizes the scheduling of cloud-based services to minimize execution time, energy consumption, and the file size transferred between clouds, while meeting specified privacy requirements. …”
Get full text
Article -
10746
Digital culture in the light of educational processes. Ad vocem for the remarks and musings of Jordan Shapiro concerning the digital childhood
Published 2025-06-01“…The aim of this article is to analyze Jordan Shapiro’s concept of digital childhood and to critically engage with some of its fundamental assumptions. While the authors share the conviction that digital culture plays a crucial role in both institutional and non-institutional education, they emphasize, more than Shapiro does, its structural conditions, including algorithmic control mechanisms and the commercialization of educational processes. …”
Get full text
Article -
10747
Thermal damage detection of EAST internal component based on machine learning
Published 2025-01-01“…The AI-based detection method provides a new solution to safeguarding the fusion device, while also offering potential avenues for integrating artificial intelligence technologies into EAST feedback control and operating systems in the future.…”
Get full text
Article -
10748
All‐in‐one perovskite memristor with tunable photoresponsivity
Published 2025-03-01“…By mapping the algorithm parameters onto the photoresponsivity, we successfully performed both recognition and processing tasks based on the TPR memristor array. …”
Get full text
Article -
10749
Numerical Investigation of Large Wood Evolution Characteristics Transported by Flash Floods
Published 2024-01-01“…The two-way coupling algorithm can reflect the influence of large wood on water flow, thereby allowing the analysis of backwater rise problems caused by logjams. …”
Get full text
Article -
10750
Multi-parameter approach to evaluate the timing of memory status after 17DD-YF primary vaccination.
Published 2018-06-01“…Multi-parameter approaches and decision-tree algorithms defined the EMCD8 and IL-5CD4 attributes as the top-two predictors with moderated performance. …”
Get full text
Article -
10751
Oral contrast-enhanced ultrasonographic features and radiomics analysis to predict NIH risk stratification for gastrointestinal stromal tumors
Published 2025-07-01“…The clinical profiles, oral contrast-enhanced ultrasonography (CEUS), and endoscopic ultrasound (EUS) imaging data were collected. 105 patients with high-risk and moderate-risk GISTs were classified into the high-risk group, while 99 patients with low-risk and very-low-risk GISTs were classified into the low-risk group. …”
Get full text
Article -
10752
On Remoteness Functions of <i>k</i>-NIM with <i>k</i> + 1 Piles in Normal and in Misère Versions
Published 2024-11-01“…For <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi><mo>=</mo><mn>5</mn><mo>,</mo><mn>6</mn></mrow></semantics></math></inline-formula>, a polynomial algorithm computing P-positions was obtained for the normal version. …”
Get full text
Article -
10753
Standardised packaging, minimum excise tax, and RYO focussed tax rise implications for UK tobacco pricing.
Published 2020-01-01Get full text
Article -
10754
Classical Benchmarks for Variational Quantum Eigensolver Simulations of the Hubbard Model
Published 2025-05-01“…While these algorithms have been shown to reproduce the qualitative features of the Hubbard model, their quantitative accuracy in terms of producing true ground state energies and other properties, and the dependence of this accuracy on the system size and interaction strength, the choice of variational ansatz, and the degree of spatial inhomogeneity in the model, remains unknown. …”
Get full text
Article -
10755
Multi-Objective Performance Evaluation Framework for Integrated Fiber-Reinforced Shading Systems
Published 2025-03-01“…The proposed framework benefits from integrating Multi-objective Evolutionary Algorithms (MOEAs). Such algorithms have proven to address conflicting parameters effectively while providing a range of different solutions to problems. …”
Get full text
Article -
10756
Hybrid Filtering Technique for Accurate GNSS State Estimation
Published 2025-04-01“…For the real-world dynamic dataset, our method also provides a better fit to the measurements than the classical algorithms.…”
Get full text
Article -
10757
Can Knowledge Distillation Enable Seismic Interpolation, Super-Resolution, and Denoising Simultaneously?
Published 2025-01-01“…For comparison, we combine three interpolation algorithms with three super-resolution algorithms and select the one with the best performance. …”
Get full text
Article -
10758
Pharmacotherapeutic Options for Ophthalmic Conjunctivitis
Published 2018-06-01“…Herpes simplex and Herpes zoster are the infective organisms also responsible for conjunctivitis while seasonal pollens are usually the cause for allergic conjunctivitis. …”
Get full text
Article -
10759
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01“…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
Get full text
Article -
10760
An optimized elliptic curve digital signature strategy for resource-constrained devices
Published 2025-07-01“…Abstract Ensuring robust security in resource-constrained environments, such as microcontrollers used in Unmanned Vehicle systems (UVS), poses significant challenges due to the computational and memory demands of cryptographic algorithms. This research addresses these challenges by proposing an optimized ECC digital signature method designed for such environments. …”
Get full text
Article