-
2601
Implementation of MS Circle Map in Digital Image Encryption
Published 2025-06-01“…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
Get full text
Article -
2602
VAMP-Based Kalman Filtering Under Non-Gaussian Process Noise
Published 2025-01-01“…For the sake of theoretical performance prediction, we conduct a state evolution (SE) analysis of the proposed algorithm and show its consistency with the asymptotic empirical mean-squared error (MSE). …”
Get full text
Article -
2603
Spatial dynamics of malaria transmission.
Published 2023-06-01“…Here, we present a patch-based differential equation modeling framework that extends the Ross-Macdonald model with sufficient skill and complexity to support planning, monitoring and evaluation for Plasmodium falciparum malaria control. …”
Get full text
Article -
2604
Big Data Digging of the Public’s Cognition about Recycled Water Reuse Based on the BP Neural Network
Published 2018-01-01“…Based on a multivariate clustering algorithm, MATLAB software was used to make real testing on massive effective data and assumption models, so as to analyze the proportion of three evaluation factors and understand the simulation parameter scope of the cognition degree of different groups of citizens. …”
Get full text
Article -
2605
An Adaptive Distributed Consumer Trust Model for Social Commerce
Published 2024-12-01“…The main features of its algorithm include (1) When calculating product trustworthiness, evaluations from consumers themselves, social networks, and e-commerce platforms are integrated, and the importance of these three sources of trust can change adaptively as consumers learn. (2) When selecting product providers and advisers, the Softmax algorithm is used to deal with the “exploration or exploitation” dilemma in reinforcement learning. (3) Consider the emotional attachment between consumers and advisers. (4) Design a blacklist mechanism to determine alternative product providers. …”
Get full text
Article -
2606
Sensitivity Analysis Based on E-TOPSIS Combined with MORIME-Based Multi-Objective Optimization for Sprayer Frame Design Optimization
Published 2025-02-01“…This study establishes a sensitivity evaluation system based on the E-TOPSIS method and combines it with the MORIME algorithm for the optimization design of the frame. …”
Get full text
Article -
2607
Comparative Study of the Performance of Two Treatment Planning Systems Using Tests from the MPPG 5b Guidelines, TECDOC 1583 and Venselaar's Confidence Limits
Published 2025-04-01“…The evaluation of both systems was conducted following different methods, including point measurements, dose profiles, and measurements on phantoms with heterogeneities. …”
Get full text
Article -
2608
BT-YOLO11: Automatic Driving Road Target Detection in Complex Scenarios
Published 2025-01-01“…The Tri-directional Feature Pyramid Net is used in the feature fusion stage, which adequately fuses different levels of feature information and improves the accuracy and robustness of the algorithm. …”
Get full text
Article -
2609
The role of MRO as an M2 macrophage-associated gene in non-small cell lung cancer: insights into immune infiltration, prognostic significance, and therapeutic implications
Published 2025-01-01“…Single-cell RNA sequencing data from TISCH2 evaluated MRO expression in different cell types. The ESTIMATE algorithm analyzed correlations between MRO expression and immune scores, while TIDE and Submap analyses predicted immunotherapy responses. …”
Get full text
Article -
2610
Enhancing Indoor Localization Accuracy in Dense IoT-Integrated 5GNR Networks: Introducing SGNCL for Sensor-Guided NLoS Correction Localization
Published 2024-01-01“…This article presents the development and simulation-based evaluation of the sensor-guided non-line-of-sight (NLoS) corrective localization (SGNCL) algorithm within the 5G New Radio network framework. …”
Get full text
Article -
2611
DMSO-free cryopreservation of hiPSC-derived cardiomyocytes: low temperature characterization and protocol development
Published 2025-06-01“…Subsequently, biophysical characterization of the cells was performed. A differential evolution (DE) algorithm was utilized to determine the optimal composition of a mixture of a sugar, sugar alcohol and amino acid to replace DMSO as the CPA. …”
Get full text
Article -
2612
User-Independent Activity Recognition via Three-Stage GA-Based Feature Selection
Published 2014-03-01“…Achieving this goal is tough for two reasons: firstly, different people exhibit different physical patterns for the same activity due to their different behavior. …”
Get full text
Article -
2613
A Model for Monitoring Spontaneously Reported Medication Errors Using the Adjuvanted Recombinant Zoster Vaccine as an Example
Published 2024-01-01“…This allows further assessment and potential prevention of medication errors. In addition, the algorithm is easy to implement and can be used to categorize medication errors from different databases.…”
Get full text
Article -
2614
LuViRA Dataset Validation and Discussion: Comparing Vision, Radio, and Audio Sensors for Indoor Localization
Published 2024-01-01“…Each sensor is paired with a current state-of-the-art localization algorithm and evaluated for different aspects: localization accuracy, reliability and sensitivity to environment changes, calibration requirements, and potential system complexity. …”
Get full text
Article -
2615
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Experimental outcomes and security analysis confirm that this face encryption scheme provides robust security and high efficiency, as evidenced by key performance metrics specifically an information entropy value of 7.9992, MSE of 8908.61, PSNR of 8.9619, SSIM of 0.00091, NPCR of 99.7163%, UACI of 33.5671%, demonstrating the robustness of our encryption algorithm against differential attacks, and a key space of $$\:\:{2}^{1024}$$ , ensuring resistance against brute-force attacks. …”
Get full text
Article -
2616
Bamboo bio composite: A renewable and sustainable sound absorber for acoustic comfort in indoor settings
Published 2025-05-01“…Porosity and airflow resistivity (AFR) parameters were directly determined, while the parameters of tortuosity, viscous, and thermal characteristic length were inversely determined using the differential evolution algorithm in MATLAB. The Field Emission Scanning Electron Microscope (FESEM) was also used for the morphological analysis of the samples. …”
Get full text
Article -
2617
An Automated Decision Support System for Portfolio Allocation Based on Mutual Information and Financial Criteria
Published 2025-04-01“…To solve the resulting non-smooth programming problem with non-convex constraints, this paper proposes a variant of the distance-based parameter adaptation for success-history-based differential evolution with double crossover (DISH-XX) algorithm equipped with a hybrid constraint-handling approach. …”
Get full text
Article -
2618
Qinghai Energy Demand Forecasting and Development Strategy Research under the Background of Construction of Clean Energy Demonstration Province
Published 2021-07-01“…Then, a DMDE-BPNN hybrid prediction model is established by optimizing the BP neural network prediction model with the double mutation differential evolution algorithm. By taking Qinghai Province as an example, the annual energy demand in typical years is forecasted, and some measures are proposed for the development of clean energy in Qinghai Province.…”
Get full text
Article -
2619
Forecasting outbound student mobility: A machine learning approach.
Published 2020-01-01“…<h4>Methods</h4>To analyze outbound student mobility in Taiwan using time series methods, this study aims to propose a hybrid approach FSDESVR which combines feature selection (FS) and support vector regression (SVR) with differential evolution (DE). FS and a DE algorithm were used for selecting reliable input features and determining the optimal initial parameters of SVR, respectively, to achieve high forecast accuracy.…”
Get full text
Article -
2620
Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques
Published 2025-03-01“…To solve this problem, various authors proposed different algorithms like the randomized algorithm, heuristic algorithm, meta heuristic algorithm, machine learning algorithm, and graph-based algorithm for finding the optimal placement. …”
Get full text
Article