Suggested Topics within your search.
Suggested Topics within your search.
-
18781
From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X
Published 2025-04-01“…The findings indicate that current studies often lack comprehensive evaluations of critical aspects such as prediction scope, types of cybersecurity threats, feature extraction techniques, algorithm complexity, information summarization levels, scalability over time, and performance measurements. …”
Get full text
Article -
18782
A new model of dry firn-densification constrained by continuous strain measurements near South Pole
Published 2023-12-01“…We use the data to derive a new firn-densification algorithm framed as a constitutive relationship. We also compare our measurements to compaction rates predicted by several existing firn-densification models. …”
Get full text
Article -
18783
Panel Temperature Dependence on Atmospheric Parameters of an Operative Photovoltaic Park in Semi-Arid Zones Using Artificial Neural Networks
Published 2024-11-01“…These results demonstrate that the ANN is a powerful tool for predicting panel temperature with high accuracy.…”
Get full text
Article -
18784
Unleashing the power of intelligence: revolutionizing malaria outbreak preparedness with an advanced warning system in Benin, West Africa
Published 2025-04-01“…Results Relative humidity and maximal temperature significantly influence malaria incidence in the northern region of Benin. SVM regression algorithm forecasts 80% prediction rate for malaria incidence. …”
Get full text
Article -
18785
Estimation of gas hydrate and free gas saturation using the rock physics model based on constrained least squares and trust region method in the Shenhu Area, South China Sea
Published 2025-04-01“…Additionally, the application results indicate that the trust region algorithm demonstrates favorable global convergence.…”
Get full text
Article -
18786
Prox-STA-LSTM: A Sparse Representation for the Attention-Based LSTM Networks for Industrial Soft Sensor Development
Published 2024-01-01“…More importantly, the prediction performances are also enhanced.…”
Get full text
Article -
18787
VERIFICATION OF A TRAIN ON RAILWAY TRACK SIMULATION AND OPTIMIZATION SYSTEM
Published 2023-09-01“…The main achievement is the development of an algorithm that simulates the passage of a train over 500 km, the duration of which did not exceed two minutes. …”
Get full text
Article -
18788
Cystinosis symposium: a rare disease model for comprehensive care
Published 2025-07-01“…This conference was one of the first to address the glaring deficiencies in the care of children and adults with cystinosis by focusing on themes that are mutually applicable to multidisciplinary healthcare providers, educators, and families. The ultimate goal was to disseminate new information and awareness to all engaged in the cystinosis community and provide an algorithm to navigate more effectively the promising future toward a cure.…”
Get full text
Article -
18789
Image Target Detection and Recognition Method Using Deep Learning
Published 2022-01-01Get full text
Article -
18790
Forced Response Vibration Analysis of the Turbine Blade with Coupling between the Normal and Tangential Direction
Published 2022-01-01“…To validate the algorithm of the solution, numerical results of previous references in the turbine-blade field are regenerated. …”
Get full text
Article -
18791
Hybrid Reactive Power Compensator with Adaptation of the Operation of the Control System to the Parameters of the Mains Voltage
Published 2023-02-01“…The most important result is the development of a block diagram of the control system for the active part of the reactive power compensator based on the implementation of the Levinson-Durbin linear prediction algorithm. The significance of the results obtained lies in the possibility of the proposed control scheme for the active part of the compensator to adapt the operation of the compensator to the voltage parameters of the catenary, that is, to the actual operating conditions of the electric locomotive.…”
Get full text
Article -
18792
Мethodology for calculation of phase behavior of a natural hydrocarbon system with account of formation water mineralization
Published 2025-04-01“…Unlike the traditional algorithm, this methodology involves the Sechenov equation. …”
Get full text
Article -
18793
Mutual-Energy Inner Product Optimization Method for Constructing Feature Coordinates and Image Classification in Machine Learning
Published 2024-12-01“…Next, by combining the finite element method, a stable and efficient sequential linearization algorithm is constructed to solve the optimization model. …”
Get full text
Article -
18794
Target Detection and Image Enhancement for Underwater Environment: Research on Improving YOLOv7
Published 2025-01-01“…Meanwhile, the image enhancement algorithm designed in this paper plays an important role in improving the quality of the input data, which effectively enhances the performance of the target detection model in the complex underwater environment. …”
Get full text
Article -
18795
Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism
Published 2014-03-01“…A distributed consensus-based scheme by simulating the crowd trust and decision-making mechanism was proposed.This scheme firstly predicts the dynamic trust value among sensing users by the previous cooperative process,and then generates the user's relative trust value,and makes the data interaction among the users by using the combination of relative trust value and decision-making mechanism.All users' state can reach a consensus as the credible and iterative data interaction.All users get the final results by the determinant algorithm.This new spectrum sensing scheme utilizes the imbalance of each users' sensing ability in the real environment.Each secondary user can maintain cooperation with others only through the local information exchange with the neighbors.It is quite different from traditional spectrum sensing scheme,such as OR-rule,1-out-of-N rule and ordinary iterative method.Three SSDF attacks were analysed,on the basis of the corresponding anti-attack policy was proposed.Theoretical analysis and simulation results show that the new scheme is better than the existing cooperative spectrum sensing algorithm in accuracy and security.New scheme not only can improve the accuracy of spectrum sensing but also has the strong anti-attack capability.…”
Get full text
Article -
18796
Electricity Theft Detection in a Smart Grid Using Hybrid Deep Learning-Based Data Analysis Technique
Published 2024-01-01“…Therefore, we proposed a hybrid artificial intelligence (AI) technique considering sudden changes of consumption in order to accurately predict fraudulent consumers in the smart network. …”
Get full text
Article -
18797
Making sense of transformer success
Published 2025-04-01“…In particular, available experimental studies turned to test the theory of mind, discourse entity tracking, and property induction in NLMs are examined under the light of the functional analysis in the philosophy of cognitive science; the so-called copying algorithm and the induction head phenomenon of a Transformer are shown to provide a mechanist explanation of in-context learning; finally, current pioneering attempts to use NLMs to predict brain activation patterns when processing language are here shown to involve what we call a co-simulation, in which a NLM and the brain are used to simulate and understand each other.…”
Get full text
Article -
18798
Elastoplastic Constitutive Model for Energy Dissipation and Crack Evolution in Rocks
Published 2025-04-01“…Subsequently, a three-dimensional finite difference scheme for the theoretical model is derived to implement a numerical algorithm. Finally, using argillaceous siltstone as an example, the validity of the theoretical model and its algorithmic implementation is verified through experimental testing, result analysis, model construction, secondary development, and numerical simulation. …”
Get full text
Article -
18799
Statistical Analysis of the Model Parameters of the Epidemic Situation
Published 2015-10-01Get full text
Article -
18800
Study on multi-parameter optimization of seismic isolation bearings for continuous girder bridges considering interactions among key parameters
Published 2025-05-01“…First, using a conventional particle swarm optimization (PSO) algorithm, the individual and combined effects of each parameter on key response indicators are identified. …”
Get full text
Article