-
641
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
642
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
643
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
644
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
645
AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection
Published 2025-05-01“…Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. …”
Get full text
Article -
646
Research on SBMPC Algorithm for Path Planning of Rescue and Detection Robot
Published 2020-01-01“…This research aims to improve autonomous navigation of coal mine rescue and detection robot, eliminate the danger for rescuers, and enhance the security of rescue work. …”
Get full text
Article -
647
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
648
A Global Path Planning Algorithm Based on Bidirectional SVGA
Published 2017-01-01“…This algorithm does not construct a visibility graph before the path optimization. …”
Get full text
Article -
649
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
Article -
650
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
651
Implications of algorithmic bias in AI-driven emergency response systems
Published 2026-01-01“…Unlike existing research, which mostly addresses technical or ethical aspects in isolation, our approach integrates economic theory with algorithmic fairness to quantify and systematically analyze how biases in data quality and algorithm design impact resource allocation efficiency, response time equity, healthcare outcomes, and social welfare. …”
Get full text
Article -
652
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01Get full text
Article -
653
Adaptive Top-K Algorithm for Medical Conversational Diagnostic Model
Published 2024-08-01“…To improve the efficiency and accuracy of telemedicine diagnostic systems, this study developed an optimized algorithm for the Top-K algorithm. …”
Get full text
Article -
654
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…The results confirm the efficiency of the proposed feature selection method in improving Arabic Text Classification accuracy. Keywords: Arabic Natural Language Processing, Feature Selection, Firefly optimization method, Text Classification…”
Get full text
Article -
655
Advancing multi-categorization and segmentation in brain tumors using novel efficient deep learning approaches
Published 2024-11-01“…Using the Binary Chaotic Transient Search Optimization (BCTSO) Algorithm, the most pertinent features in terms of shape, texture, and colour are chosen to minimize complexity. …”
Get full text
Article -
656
Opposition-Based White Shark Optimizer for Optimizing Modified EfficientNetV2 in Road Crack Classification
Published 2025-01-01“…This study focuses on the potential of hybrid deep learning and bio-inspired optimization strategies to improve automated pavement maintenance systems.…”
Get full text
Article -
657
Visual Multiple-object Tracking Algorithm Based on Motion Consistency
Published 2023-08-01“…The algorithm aims to improve the stability in tracking multiple objects with similar appearance features and motion patterns, while maintaining stability in normal cases. …”
Get full text
Article -
658
A modified instantaneous reactive power algorithm for shunt compensation
Published 2025-07-01“…This paper proposes a new approach of IRP p-q theory for reference current generation in Distribution Static Compensator (DSTATCOM) in 3-ph, 4-wire distribution system with unbalanced, distorted source and non-linear loads, both. Algorithm is developed based on fundamental concept of equal current criteria to handle magnitude unbalance, improved formulations using time synchronization of source phase-a voltage for compensating phase unbalance, and fundamental positive sequence extraction to eliminate distortion in the source currents. …”
Get full text
Article -
659
HUMAN EMOTION RECOGNITION SYSTEM USING DEEP LEARNING ALGORITHMS
Published 2022-09-01“…Therefore, the purpose of the work is to find and optimize the most satisfactory in terms of accuracy algorithm for classifying human emotions based on facial images. …”
Get full text
Article -
660
Anomaly Detection and Root Cause Analysis for Energy Consumption of Medium and Heavy Plate: A Novel Method Based on Bayesian Neural Network with Adam Variational Inference
Published 2025-01-01“…Anomaly detection and root cause analysis of energy consumption not only optimize energy use and improve equipment reliability but also contribute to green and low-carbon development. …”
Get full text
Article