-
4081
Compositional modeling of solution gas–oil ratio (Rs): a comparative study of tree-based models, neural networks, and equations of state
Published 2025-03-01“…A relevancy factor analysis quantified the influence of each input parameter on model outputs, whereas the Leverage technique identified outliers and defined the parameter ranges for optimal algorithm performance. While the ML models achieved high predictive reliability, their computational demands and complexity may limit deployment in resource-constrained environments and decision-critical applications. …”
Get full text
Article -
4082
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies
Published 2025-08-01“…Abstract Multi-camera multi-vehicle tracking (MCMVT) is essential for intelligent transportation and urban security but is hindered by similar vehicle appearances, varying viewpoints, and occlusions. While existing offline algorithms offer high accuracy, their heavy computational load and lack of real-time performance limit practical use. …”
Get full text
Article -
4083
Combination of Feature Selection and Learning Methods for IoT Data Fusion
Published 2017-12-01“…In this paper, we propose five data fusion schemes for the Internet of Things (IoT) scenario,which are Relief and Perceptron (Re-P), Relief and Genetic Algorithm Particle Swarm Optimization (Re-GAPSO), Genetic Algorithm and Artificial Neural Network (GA-ANN), Rough and Perceptron (Ro-P)and Rough and GAPSO (Ro-GAPSO). …”
Get full text
Article -
4084
Linear Continuous-Time Regression and Dequantizer for Lithium-Ion Battery Cells with Compromised Measurement Quality
Published 2025-02-01“…Then, the Linear Continuous-Time Regression (LCTR) algorithm extracts exponential parameters from first-order or overdamped second-order systems, deducing ECM parameters and guaranteeing optimality with respect to RMSE. …”
Get full text
Article -
4085
Blasting Vibration Control Using an Improved Artificial Neural Network in the Ashele Copper Mine
Published 2021-01-01“…In this paper, a genetic algorithm (GA) and an artificial neural network (ANN) algorithm were jointly used to construct a neural network model with a 4-5-1 topology to predict the PPV. …”
Get full text
Article -
4086
Trade-off between gradient measurement efficiency and expressivity in deep quantum neural networks
Published 2025-05-01“…Abstract Quantum neural networks (QNNs) require an efficient training algorithm to achieve practical quantum advantages. …”
Get full text
Article -
4087
TCCM: Trajectory Converged Chaff-Based Mix-Zone Strategy for Enhancing Location Privacy in VANET
Published 2025-01-01“…Additionally, the TCCM strategy incorporates a genetic algorithm to optimize mix zone placement and ensure a balance between privacy protection and resource efficiency. …”
Get full text
Article -
4088
Adaptive enhancement of shoulder x-ray images using tissue attenuation and type-II fuzzy sets.
Published 2025-01-01“…The method integrates automatic tissue attenuation techniques, which enhance the image contrast by removing non-essential tissue components while preserving important tissues and bones. Additionally, we apply an improved Type-II fuzzy set algorithm to further optimize image sharpness. …”
Get full text
Article -
4089
A Simulation Based Metaheuristics for Capacitated Vehicle Routing Problem
Published 2025-04-01“…The methodology utilizes a simheuristics approach, integrating a Genetic Algorithm (GA) to determine optimal routing solutions, while employing Discrete Event Simulation (DES) to incorporate key economic, environmental, and social variables. …”
Get full text
Article -
4090
Lightweight YOLOv8s-Based Strawberry Plug Seedling Grading Detection and Localization via Channel Pruning
Published 2024-11-01“…Furthermore, a two-stage seedling-hole matching algorithm was introduced based on the pruned YOLOv8s model. …”
Get full text
Article -
4091
Genotyping Identification of Maize Based on Three-Dimensional Structural Phenotyping and Gaussian Fuzzy Clustering
Published 2025-01-01“…The research results showed that the Gaussian Fuzzy Clustering algorithm was the optimal choice for clustering maize genotypes. …”
Get full text
Article -
4092
A cartographic generalization method for 3D visualization of trajectories in space–time cubes: case study of epidemic spread
Published 2025-08-01“…The proposed method incorporates a 3D generalization algorithm that mitigates visual stickiness, while leveraging a 3D line field visualization technique to optimize opacity, thereby minimizing visual occlusion and spatial clutter. …”
Get full text
Article -
4093
Multi-Feature Long Short-Term Memory Facial Recognition for Real-Time Automated Drowsiness Observation of Automobile Drivers with Raspberry Pi 4
Published 2025-05-01“…The model was trained on the NTHU-DDD dataset and optimized using long short-term memory (LSTM) deep learning algorithms implemented using TensorFlow version 2.14.0. …”
Get full text
Article -
4094
A mathematical model for hybrid-electric propulsion system for regional propeller-driven aircraft
Published 2025-04-01“…A powerplant management algorithm enhances adaptability to varying power demands while ensuring a physically consistent solution. …”
Get full text
Article -
4095
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
4096
DRACO: Decentralized Asynchronous Federated Learning Over Row-Stochastic Wireless Networks
Published 2025-01-01“…Through a thorough convergence analysis, we show that DRACO achieves high performance in decentralized optimization while maintaining low variance across users even without predefined scheduling policies. …”
Get full text
Article -
4097
Distance Estimation with a Stereo Camera and Accuracy Determination
Published 2024-12-01“…These results provide valuable information on the capabilities and limitations of the measurement system used, while pointing out directions for its further optimization.…”
Get full text
Article -
4098
Neural Network-Based Imitation Learning for Approximating Stochastic Battery Management Systems
Published 2025-01-01“…Traditional predictive control methods are limited by their reliance on precise models, which are often hindered by uncertainties in battery parameters due to aging, production variability, and operational conditions. While stochastic predictive control policies can address these uncertainties by incorporating them directly into the optimization process, they typically introduce considerable computational complexity. …”
Get full text
Article -
4099
Artificial Neural Network Prediction on negative and positive activation energy of magnetohydrodynamic nanofluid flow with multiple slips
Published 2025-09-01“…Another important matter to discuss here that we have used feed-forward back-propagation multilayer perceptron artificial neural network with Levenberg-Marquard algorithm as the training algorithm to predict the Sherwood number for both activation energy values 1 and -1. …”
Get full text
Article -
4100
PV<i>k</i>NN: A Publicly Verifiable and Privacy-Preserving Exact <i>k</i>NN Query Scheme for Cloud-Based Location Services
Published 2025-06-01“…Leveraging Paillier’s homomorphic cryptosystem and public-key signature techniques, our design achieves heightened security by safeguarding databases, query access patterns, and result integrity while enabling public verification. Additionally, our scheme enhances computational efficiency through optimized data-packing techniques and simplified Voronoi diagram-based ciphertext index construction, leading to substantial savings in computational and communication overheads. …”
Get full text
Article