-
10081
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
10082
Deadline-Aware Scheduling Perspectives in Industrial Wireless Networks: A Comparison between IEEE 802.15.4 and Bluetooth
Published 2013-06-01“…In this paper, we will analyze a real-time scheduling algorithm for both periodic and aperiodic traffic management, applied to networks based on IEEE 802.15.4 and Bluetooth, respectively. …”
Get full text
Article -
10083
Decision Making Support System for the Diagnostics of the Cardiovascular System Pathologies by the X-ray Images of the Chest
Published 2023-03-01“…The importance of building algorithms for detecting extrapulmonary pathologies on chest X-ray images is dictated by the great social significance of many diseases of this group (for example, cardiovascular diseases), given the availability of such images, due to the widespread use of minimally invasive and relatively cheap X-ray diagnostic methods. …”
Get full text
Article -
10084
Development of an IEC 61850 Standard-Based Busbar Protection Scheme
Published 2025-03-01“…They determine the effectiveness of the protection scheme in terms of detecting and isolating busbar faults. A literature survey has revealed that multiple proposed algorithms of busbar protection schemes have encountered a common problem of achieving interoperability between intelligent electronic devices produced by different vendors. …”
Get full text
Article -
10085
Analysis of digital intelligent financial audit system based on improved BiLSTM neural network
Published 2025-07-01“…Traditional auditing methods have difficulties in detecting various financial issues hidden in massive amounts of data. …”
Get full text
Article -
10086
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
10087
Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone
Published 2013-04-01“…This study utilized three built-in kinematic sensors in a smartphone to recognize PA and found out which features derived from the three sensors were significant to different PA. We used a combined algorithm of Fisher's discriminant ratio criterion and J 3 criterion for feature selection. …”
Get full text
Article -
10088
Research on Soft-Sensing Methods for Measuring Diene Yields Using Deep Belief Networks
Published 2022-01-01“…A diene yield prediction method based on a deep belief network algorithm network is proposed, and the regularity of historical diene yield data is fully explored by the method. …”
Get full text
Article -
10089
Combinatorial-Semantic Analysis of Collocations as a Method of Linguistic Research (on the Example of Colour Collocations Formed by an Adjective Type)
Published 2020-04-01“…The material for study was colour collocations, which are created by the adjective type. An algorithm for performing complex analysis is presented, and the procedure for its implementation is demonstrated. …”
Get full text
Article -
10090
A Bit String Content Aware Chunking Strategy for Reduced CPU Energy on Cloud Storage
Published 2015-01-01“…In order to achieve energy saving and reduce the total cost of ownership, green storage has become the first priority for data center. Detecting and deleting the redundant data are the key factors to the reduction of the energy consumption of CPU, while high performance stable chunking strategy provides the groundwork for detecting redundant data. …”
Get full text
Article -
10091
A machine learning-based framework for predicting metabolic syndrome using serum liver function tests and high-sensitivity C-reactive protein
Published 2025-07-01“…Abstract Metabolic Syndrome (MetS) comprises a clustering of conditions that significantly increase the risk of heart disease, stroke, and diabetes. Timely detection and intervention are crucial in preventing severe health outcomes. …”
Get full text
Article -
10092
Radiomics analysis of thoracic vertebral bone marrow microenvironment changes before bone metastasis of breast cancer based on chest CT
Published 2025-02-01“…Multiple machine learning algorithms were utilized to construct various radiomics models for predicting the risk of bone metastasis, and the model with optimal performance was integrated with clinical features to develop a nomogram. …”
Get full text
Article -
10093
SpatialKNifeY (SKNY): Extending from spatial domain to surrounding area to identify microenvironment features with single-cell spatial omics data.
Published 2025-02-01“…However, microenvironment analysis using bioinformatic methods is limited by the need to detect histological morphology and extend it to the surrounding area. …”
Get full text
Article -
10094
Utilizing Cross-Layer Information to Improve Performance in JPEG2000 Decoding
Published 2007-01-01“…The soft information, which is supplied by a soft decision demodulator, yields reliability measures for the received bits and is fed into two soft input iterative JPEG2000 image decoders. When errors are detected with the error detecting mechanisms in JPEG2000, the decoders utilize the soft information to point out likely transmission errors. …”
Get full text
Article -
10095
Mobile direct-sequence spread-spectrum underwater acoustic communication based on improved differential energy detector
Published 2017-03-01“…A Doppler estimation method based on the structural features of spread spectrum signal was proposed,which could achieve real-time Doppler estimation for received spread spectrum signals by energy detecting the result of matching correlation calculation of adjacent received spreading symbols.In addition,this method made full use of the spread spectrum processing gain and could do Doppler estimation under low SNR condition.Improved differential energy detector was further proposed,which can effectively deal with the rapid carrier phase fluctuation interference caused by Doppler effect and time-varying multi-path interference by detecting the output energy of two correlators.Simulation verified the robustness of improved differential energy detector algorithm and the Doppler estimation method based on spread spectrum signal.At-sea data shows that improved differential energy detector combined with the proposed Doppler estimation method can achieve low bit error rate communication for direct-sequence spread spectrum underwater acoustic communication with large time-varying Doppler interference when SNR is −10 dB.…”
Get full text
Article -
10096
CrackNet: A new deep learning-based strategy for automatic classification of road cracks after earthquakes
Published 2025-09-01“…Timely maintenance of highways prevents higher maintenance costs in the future. Especially detecting deterioration on highways due to major earthquakes is of great importance. …”
Get full text
Article -
10097
Revolutionizing climbing perch disease management: AI-Driven solutions for sustainable aquaculture
Published 2025-03-01“…We present the Climbing Perch Disease Detection and Classification System (CPDDCS), employing cutting-edge imaging and deep learning technologies to automate disease detection. …”
Get full text
Article -
10098
Field validation and application of the luminex triplex HIV assay to estimate HIV prevalence and HIV-1 incidence in Nigeria.
Published 2025-01-01“…We evaluated the performance and accuracy of the newly developed HIV Triplex assay to diagnose HIV-1 and HIV-2 and detect HIV-1 recent infections using plasma samples from the 2018 Nigeria AIDS Indicator and Impact Survey (NAIIS). …”
Get full text
Article -
10099
AI-powered visual E-monitoring system for cattle health and wealth
Published 2025-12-01“…Through integrated deep learning algorithms, the platform performs key health-related tasks, including ear-tag, body-based, and face-based cattle identification, body condition scoring (BCS), lameness detection, feeding time estimation, and real-time localization. …”
Get full text
Article -
10100
Pengaruh Word Affect Intensities Terhadap Deteksi Ulasan Palsu
Published 2022-02-01“…These features are then combined with features in previous studies and evaluated using several classification algorithms. The results showed that word affect intensities can be a factor that affects the increased accuracy of fake review detection by 2.1%. …”
Get full text
Article