-
421
Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-Aware Routing Framework
Published 2024-01-01“…We evaluate this framework against existing protocols across various scenarios, including different network densities, mobility patterns, and malicious node percentages. …”
Get full text
Article -
422
Cross-Cultural Sense-Making of Global Health Crises: A Text Mining Study of Public Opinions on Social Media Related to the COVID-19 Pandemic in Developed and Developing Economies
Published 2025-01-01“…ResultsThe analysis revealed significant regional and temporal differences in collective sense-making during the pandemic. …”
Get full text
Article -
423
Developing an efficient explainable artificial intelligence approach for accurate reverse osmosis desalination plant performance prediction: application of SHAP analysis
Published 2024-12-01“…In this study, the predictive accuracy of six different machine learning models, including Natural Gradient-based Boosting (NGBoost), Adaptive Boosting (AdaBoost), Categorical Boosting (CatBoost), Support vector regression (SVR), Gaussian Process Regression (GPR), and Extremely Randomized Tree (ERT) was evaluated for modelling the parameter of permeate flow as a key element in system efficiency, energy consumption, and water quality using six various input combinations of feed water salt concentration, condenser inlet temperature, feed flow rate, and evaporator inlet temperature. …”
Get full text
Article -
424
Rapid Lactic Acid Content Detection in Secondary Fermentation of Maize Silage Using Colorimetric Sensor Array Combined with Hyperspectral Imaging
Published 2024-09-01“…To minimize model redundancy, three algorithms, such as competitive adaptive reweighted sampling (CARS), were used to extract the characteristic wavelengths of the three dyes, and the combination of the characteristic wavelengths obtained by each algorithm was used as an input variable to build an analytical model for quantitative prediction of the lactic acid content by support vector regression (SVR). …”
Get full text
Article -
425
Synchronous Acquisition and Processing of Electro- and Phono-Cardiogram Signals for Accurate Systolic Times’ Measurement in Heart Disease Diagnosis and Monitoring
Published 2025-07-01“…Both the ECG electrodes and the microphone were positioned on the chest to ensure the spatial alignment of the signals. An adaptive segmentation algorithm was developed to segment PCG and ECG signals based on their morphological and temporal features. …”
Get full text
Article -
426
TLINet: A defects detection method for insulators of overhead transmission lines using partially transformer block.
Published 2025-01-01“…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
Get full text
Article -
427
A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems
Published 2025-07-01“…The architecture introduces three key innovations: (1) a hybrid event–time triggered scheduling algorithm with credibility assessment and heterogeneity metrics to mitigate common-mode escape scenarios, (2) an adaptive privacy budget allocation mechanism that balances privacy protection effectiveness with system availability based on attack activity levels, and (3) a unified framework that organically integrates privacy-preserving arbitration with heterogeneous redundancy management. …”
Get full text
Article -
428
Performances improvement of Shunt active power filter With voltage sensor failure
Published 2023-06-01“…The effectiveness of this filter essentially lies in its control and command strategy to better respond to production and distribution constraints. It automatically adapts to the evolution of disturbances introduced by non-linear loads connected to the electrical network and their response is instantaneous. …”
Get full text
Article -
429
Optimal Dual Control Strategy for Multi-Interconnected Microgrids Under Unintentional Islanding and Fault Scenarios
Published 2025-01-01“…To address this issue, this paper proposes a self-tuning PI (ST-PI) controller, which is a nonlinear adaptive controller that can adapt to different operating points to regulate the system voltage and frequency. …”
Get full text
Article -
430
Temporal Denoising of Infrared Images via Total Variation and Low-Rank Bidirectional Twisted Tensor Decomposition
Published 2025-04-01“…Compared to some of the latest algorithms, bt-LPTVTD demonstrates improvements across all evaluation metrics. …”
Get full text
Article -
431
Analysis of Deep Learning Techniques for Vehicle Detection and Reidentification Using Data from Multiple Drones and Public Datasets
Published 2025-03-01“…YOLOv4 was selected for detection, while the DeepSORT algorithm was chosen for tracking. The proposed solution considers the generalization capabilities of these techniques with varied images from different drones in different positions. …”
Get full text
Article -
432
The contribution of cause-effect link to representing the core of scientific paper-The role of Semantic Link Network.
Published 2018-01-01“…The Semantic Link Network is a general semantic model for modeling the structure and the evolution of complex systems. Various semantic links play different roles in rendering the semantics of complex system. …”
Get full text
Article -
433
Enhancing Weather Target Detection with Non-Uniform Pulse Repetition Time (NPRT) Waveforms
Published 2024-11-01“…Techniques such as multiple-pulse repetition frequency, staggered pulse repetition time (PRT), and pulse phase coding are commonly used to mitigate this issue. The current study evaluates the adaptability/capability of a specific type of low-capture signal called the non-uniform PRT (NPRT) through analyzing the weather target characteristics of typical velocity distributions. …”
Get full text
Article -
434
HTML5-based graphic image processing and collaborative drawing technology
Published 2024-12-01“…The simulation analysis is carried out on MATLAB, and different image compression algorithms are used for comparison. …”
Get full text
Article -
435
2CA-R<sup>2</sup>: A Hybrid MAC Protocol for Machine-Type Communications
Published 2025-05-01“…What distinguishes this proposal is that the contention stage is controlled by a conflict–resolution algorithm known as Adaptive-2C. The protocol was evaluated using a model based on a Markov chain and computer simulations. …”
Get full text
Article -
436
Optimal design of a hybrid system composed of coagulation process and multi-stage filtration unit for on-site treatment of greywater in rural area
Published 2025-05-01“…Multilayer nonlinear machine learning model was utilized to evaluate the performance of this hybrid system and adaptive heuristic search algorithm was used to achieve the optimal configuration of multilayer sand filter using optimization technique. …”
Get full text
Article -
437
Artificial intelligence in educational technology and transformative approaches to English language using fuzzy framework with CRITIC-TOPSIS method
Published 2025-07-01“…Abstract Artificial intelligence (AI) is transforming educational technology by enabling personalized, adaptive, and data-driven learning experiences. Machine learning algorithms analyze student performance to tailor content delivery, while natural language processing facilitates interactive learning through voice assistants and essay evaluation. …”
Get full text
Article -
438
Combination treatment optimization using a pan-cancer pathway model.
Published 2021-12-01“…In order to solve the treatment optimization problems, we combine the Covariance Matrix Adaptation Evolution Strategy (CMA-ES) algorithm with a significantly more scalable sampling scheme for truncated Gaussian distributions, based on a Hamiltonian Monte-Carlo method. …”
Get full text
Article -
439
Deepmol: an automated machine and deep learning framework for computational chemistry
Published 2024-12-01“…Despite its potential to revolutionize the field, researchers are often encumbered by obstacles, such as the complexity of selecting optimal algorithms, the automation of data pre-processing steps, the necessity for adaptive feature engineering, and the assurance of model performance consistency across different datasets. …”
Get full text
Article -
440
Detection and Analysis of Malicious Software Using Machine Learning Models
Published 2024-08-01“…The continuous evolution of malware poses a significant challenge in cybersecurity, adapting to technological advancements despite implemented security measures. …”
Get full text
Article