-
7001
Distributed Event-Triggered-Based Adaptive Formation Tracking Control for Multi-UAV Systems Under Fixed and Switched Topologies
Published 2025-03-01“…Finally, the validity of the designed algorithm is confirmed by numerical examples and software-in-the-loop (SIL) simulation experiments.…”
Get full text
Article -
7002
Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders
Published 2024-04-01“…Experiments on public data sets and NS-3 simulation data sets show that while ensuring lightweight, the proposed model reduces the false negative rate by an average of 35.9% and 48% compared with the baseline method.…”
Get full text
Article -
7003
Hybrid modeling for optimizing electrospun polyurethane nanofibrous membranes in air filtration applications
Published 2025-07-01“…However, optimizing their structural characteristics to maximize filtration efficiency while minimizing pressure drop remains challenging due to the complexity of the electrospinning process. …”
Get full text
Article -
7004
Accurate Solar Radiation Forecasting Through Feature-Enhanced Decision Trees and Wavelet Decomposition
Published 2025-01-01“…This study explores the efficacy of the decision tree algorithm in predicting solar power generation, addressing the inherent variability in photovoltaic (PV) energy production due to weather conditions. …”
Get full text
Article -
7005
Comparing the Effect of Age, Gender, and Desired Speed on Car-Following Behavior by Using Driving Simulator
Published 2021-01-01“…The CF model for each driver was calibrated by genetic algorithm. Gender and DS were effective in CF behavior, while the age factor was not. …”
Get full text
Article -
7006
Automatic speech analysis combined with machine learning reliably predicts the motor state in people with Parkinson’s disease
Published 2025-05-01“…Acoustic speech features were automatically extracted with the algorithm given by the Dysarthria Analyzer. Results suggest that acute levodopa intake improves phonatory-respiratory speech functions and speech planning abilities, while the articulatory system remains unaffected. …”
Get full text
Article -
7007
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
7008
Authentication of an Indonesian ID Card with Simultaneous NFC and Face Recognition
Published 2025-06-01“…The application, developed using Flutter, incorporates facial recognition for biometric verification, while NFC is employed as an additional authentication layer to provide dual-factor verification and reinforce identity security. …”
Get full text
Article -
7009
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“…The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms. …”
Get full text
Article -
7010
Development of View Optimization Techniques for Structural Monitoring Systems Using Post-Processing of Structural Analysis and Image Processing
Published 2025-01-01“…The proposed framework for view optimization utilized the results from structural analysis performed in ABAQUS to extract initial camera positions and direction vectors, which served as inputs for an optimization algorithm. The optimization process applied image processing methods to detect deformation areas, while performance was evaluated at each iteration and saved when improvements were found. …”
Get full text
Article -
7011
Retrospective Illumination Correction of Retinal Images
Published 2010-01-01“…Among the tested optimizers, the gradient-based optimizer with varying step has shown to have the fastest convergence while providing the best precision. The final algorithm proved to be able of suppressing approximately 70% of the artificially introduced non-homogenous illumination. …”
Get full text
Article -
7012
Intelligent CO2 Monitoring for Diagnosis of Sleep Apnea Using Neural Cryptography Techniques
Published 2022-01-01“…The accuracy of the GEP-KNN algorithm with different K values produced the highest accuracy at K=9 and k=10 of 95.12% and 95.67%; the lowest accuracy is K=1 of 65.34%.…”
Get full text
Article -
7013
Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models
Published 2024-01-01“…The paper explores the subject of data flow optimization using Fuzzy Assisted Cuckoo Search Optimization (FACSO), traffic flow using Gaussian Process Regression (GPR), and CH prediction using the Stochastic Optimization Algorithm (SOA). Optimizing network lifetime while minimizing Energy Consumption (EC) is feasible through the practical application of the SOA, GPR, and FACSO models. …”
Get full text
Article -
7014
Journalism’s transformation through digitalization in Turkey: Applying search engine optimization to journalism
Published 2022-12-01“…These discussions focus on how producing news by focusing on algorithms contradicts the professional principles of journalism. …”
Get full text
Article -
7015
Celebratory expressions and linguistic diversity: investigating congratulation patterns among Pakistani Facebook users commenting in English and Urdu
Published 2024-12-01“…Elwood’s taxonomy and Allami and Pishghadam’s refined framework were used for verbal coding, while nonverbal data followed Facebook’s algorithm guidelines and Dresner and Herring’s framework. …”
Get full text
Article -
7016
A Measurement-Driven Method for the Simultaneous Solution of AX = YB in the Implementation of Simulated Robotic Production Systems
Published 2025-06-01“…The geometric method, while widely used for its simplicity, demonstrated the highest error and instability due to poor rotational alignment. …”
Get full text
Article -
7017
Performance of a new stabilized structure-preserving finite element method for the Allen–Cahn equation
Published 2024-12-01“…The scheme combines the Crank–Nicolson/Adams–Bashforth technique with the Galerkin method, complementing a thoughtfully designed stabilization term. While the Allen–Cahn equation is inherently nonlinear, our proposed algorithm effectively addresses this nonlinearity by utilizing the implicit nature of the resulting system of equations. …”
Get full text
Article -
7018
Study on the Sealing Structure of Scroll Tooth of an Oil-free Scroll Compressor
Published 2020-01-01“…Geometry and engineering fluid mechanics were considered to develop an algorithm for determining leakage from the tooth top of the base circular involute oil-free scroll compressor with a smooth clearance tip seal, labyrinth tip seal, and combination tip seal. …”
Get full text
Article -
7019
A Gaussian process approach for contextual bandit-based battery replacement
Published 2025-01-01“…Modifications are made to the traditional MAB algorithm, incorporating the lower confidence bound (LCB), contextual features, kernelization, and the Gaussian Process (GP) to enhance the Upper Confidence Bound (UCB) MAB in solving this problem. …”
Get full text
Article -
7020
Fire weather indices tailored to regional patterns outperform global models
Published 2025-07-01“…Tailoring the index to each country with a Genetic Algorithm significantly improves its accuracy, raising the ROC AUC from 0.69 to 0.79. …”
Get full text
Article