-
6061
A Review of Numerical Techniques for Frictional Contact Analysis
Published 2025-01-01“…The choice of contact algorithm significantly impacts accuracy and efficiency; penalty methods, though computationally efficient, can lack accuracy at high friction coefficients; whereas, Lagrange multiplier methods, while more accurate, are computationally more demanding. …”
Get full text
Article -
6062
Feature fusion with attributed deepwalk for protein–protein interaction prediction
Published 2025-04-01“…Abstract protein–protein interactions (PPIs) are crucial for understanding cellular processes and disease mechanisms. While experimental methods for detecting PPIs exist, computational approaches offer a more efficient alternative. …”
Get full text
Article -
6063
SHAPING THE STOCK PORTFOLIO BY THE INVESTMENT RATING METHOD
Published 2018-02-01“…For the last five years capitalization of joint stock companies in Russia nearly doubled while the major indicator of stock market development, i. e. …”
Get full text
Article -
6064
PV<i>k</i>NN: A Publicly Verifiable and Privacy-Preserving Exact <i>k</i>NN Query Scheme for Cloud-Based Location Services
Published 2025-06-01“…The <i>k</i>-nearest- neighbor (<i>k</i>NN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. …”
Get full text
Article -
6065
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT
Published 2025-01-01“…This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. …”
Get full text
Article -
6066
Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control
Published 2025-04-01“…This research presents the SmartIoT Hybrid Machine Learning (ML) Model, a novel integration of Attribute-Based Authentication and a lightweight machine learning algorithm designed to enhance security while minimising computational overhead. …”
Get full text
Article -
6067
DRACO: Decentralized Asynchronous Federated Learning Over Row-Stochastic Wireless Networks
Published 2025-01-01“…Our approach leverages continuous communication, allowing edge devices to perform local training and exchange model updates along a continuous timeline, thereby eliminating the need for synchronized timing. Additionally, our algorithm decouples communication and computation schedules, enabling complete autonomy for all users while effectively addressing straggler issues. …”
Get full text
Article -
6068
Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks
Published 2025-07-01“…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
Get full text
Article -
6069
Optimizing the train timetable in a high-speed rail corridor: The implications on departure time, fare cost and seat preference of passengers.
Published 2025-01-01“…Using the Lanzhou-Xi'an high-speed railway corridor as a case study, we apply a genetic algorithm combined with a nested Frank-Wolfe method to solve the model. …”
Get full text
Article -
6070
Low-Power Portable System for Power Grid Foreign Object Detection Based on the Lightweight Model of Improved YOLOv7
Published 2025-01-01“…Foreign objects caught and entangled on power grid transmission lines, power towers and other equipment can pose potential threats to the power system. The detection algorithm for foreign objects in the power grid cannot achieve the optimal balance in terms of accuracy and efficiency. …”
Get full text
Article -
6071
External phantom-based validation of a deep-learning network trained for upscaling of digital low count PET data
Published 2025-04-01“…Conclusions Phantom-based validation of AI-based algorithms allows for a detailed assessment of the performance, limitations, and generalizability of deep-learning based algorithms for PET image enhancement. …”
Get full text
Article -
6072
Dual-coding Contrastive Learning Based on the ConvNeXt and ViT Models for Morphological Classification of Galaxies in COSMOS-Web
Published 2025-01-01“…Using the GoogLeNet algorithm, we classify the morphology of the remaining 27% of galaxies. …”
Get full text
Article -
6073
Genotyping Identification of Maize Based on Three-Dimensional Structural Phenotyping and Gaussian Fuzzy Clustering
Published 2025-01-01“…By leveraging the 3D reconstruction algorithm SFM (Structure from Motion), we promptly obtained point clouds of the maize tassels. …”
Get full text
Article -
6074
Automatic Detection of Occluded Main Coronary Arteries of NSTEMI Patients with MI-MS ConvMixer + WSSE Without CAG
Published 2025-02-01“…<b>Results:</b> This algorithm improves the SVM classifier performance. …”
Get full text
Article -
6075
An Improved COLD Approach for Monitoring Construction Dynamics Using HLS and LULC Data: A Case Study in the New Capital of Egypt
Published 2025-07-01“…The Continuous Monitoring of Land Disturbances (COLD) algorithm is a widely used method for detecting rapid ground changes using Harmonized Landsat and Sentinel (HLS) data. …”
Get full text
Article -
6076
Evaluation of Soil Moisture Retrievals from a Portable L-Band Microwave Radiometer
Published 2024-12-01“…By comparing PoLRa-based soil moisture retrievals against the simultaneous moisture values obtained by a handheld capacitance probe, the unbiased root mean square error (ubRMSE) and the Pearson correlation coefficient (R) are mostly below 0.05 m<sup>3</sup>/m<sup>3</sup> and above 0.7 for various algorithms adopted here. While SMAP models and the DCA algorithm can derive soil moisture from PoLRa observations, no single algorithm consistently outperforms the others. …”
Get full text
Article -
6077
COD Optimization Prediction Model Based on CAWOA-ELM in Water Ecological Environment
Published 2021-01-01“…In order to detect high error rate and poor convergence of the water ecological chemical oxygen demand (COD) prediction model, combining the limit learning machine (ELM) model and whale optimization algorithm, CAWOA is improved by the sin chaos search strategy, while the ELM optimizes the parameters of the algorithm to improve convergence speed, thus improving the generalization performance of the ELM. …”
Get full text
Article -
6078
Adaptive Cooperative Quality Weight Spectrum Sensing for Mitigating Byzantine Attacks in Cognitive Radio
Published 2025-01-01“…In this paper, we propose the adaptive cooperative quality weight algorithm for mitigating the Byzantine attack issue by distinguishing the BAs and CRUs from the data fusion account while selecting only useful CRUs since the number of members in the account is also the important factor for cooperative spectrum sensing. …”
Get full text
Article -
6079
Least travel time ray tracer version 2 (LTT v2) adapted to the grid geometry of the OpenIFS atmospheric model
Published 2025-08-01“…In principle, the LTT-based RT algorithm is seen as an extension of an atmospheric model for signal delay evaluation. …”
Get full text
Article -
6080
Spatially optimized allocation of water and land resources based on multi-dimensional coupling of water quantity, quality, efficiency, carbon, food, and ecology
Published 2025-03-01“…The COM-WL model integrates our improved genetic algorithm, PAEA-NSGAⅢ, with the landscape allocation model, GridLOpt. …”
Get full text
Article