-
81
Satellite Image Classification Using a Hybrid Manta Ray Foraging Optimization Neural Network
Published 2023-03-01“…The seed selection is done using the spectral indices to further improve the performance of the network. The manta ray foraging optimization algorithm is inspired by the intelligent behaviour of manta rays. …”
Get full text
Article -
82
Improving health-promoting workplaces through interdisciplinary approaches. The example of WISEWORK-C, a cluster of five work and health projects within Horizon-Europe
Published 2025-07-01“…In contrast, supportive work environments—characterized by ergonomic design, good environmental quality, and worker autonomy—have been shown to improve well-being, productivity, and job satisfaction (4). …”
Get full text
Article -
83
Calculation method of line loss rate of substation areas considering tidal current variation with photovoltaic power generation access
Published 2025-04-01“…The proposed method employs an improved K-medoids clustering algorithm for substation area classification, optimized by an enhanced Cuckoo algorithm to minimize classification errors. …”
Get full text
Article -
84
A New Approach to Environmental Economic Dispatch Using Multiobjective Differential Evolution: A Case Study
Published 2025-01-01Get full text
Article -
85
Emergency Resource Dispatch Scheme for Ice Disasters Based on Pre-Disaster Prediction and Dynamic Scheduling
Published 2025-07-01“…First, the fast Newman algorithm is employed to cluster communities, optimizing the preprocessing of resource scheduling and reducing scheduling costs. …”
Get full text
Article -
86
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01Get full text
Article -
87
-
88
-
89
Delphi consensus statement for the management of delayed post-polypectomy bleeding
Published 2025-04-01“…These recommendations aim to improve patient outcomes and optimize healthcare resources while fostering a standardized approach to this common adverse event.…”
Get full text
Article -
90
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
Get full text
Article -
91
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience
Published 2025-04-01“…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
Get full text
Article -
92
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01Get full text
Article -
93
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
94
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
95
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
96
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
97
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
Article -
98
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
99
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01Get full text
Article -
100
IDE-SVM algorithm and it's usage in physical layer security method for IoT
Published 2024-10-01Get full text
Article