Suggested Topics within your search.
Suggested Topics within your search.
-
1301
Auxiliary Particle Flow Track-Before-Detect Algorithm for Marine Neighboring Weak Targets
Published 2025-04-01“…Detection and tracking of marine weak targets can be effectively solved by track-before-detect (TBD) algorithms based on particle filtering. However, these algorithms are susceptible to influence from neighboring targets, leading to potential issues like misassociation and tracking failure. …”
Get full text
Article -
1302
A Branch-and-Price-and-Cut Algorithm for the Integrated Scheduling and Rostering Problem of Bus Drivers
Published 2020-01-01“…The results show that the proposed BPC algorithm can solve problems with large real-world instances within a reasonable computational time. …”
Get full text
Article -
1303
-
1304
Self-Schedule and Self-Distributive MAC Scheduling Algorithms for Next-Generation Sensor Networks
Published 2015-10-01“…Moreover, the proposed algorithms also guarantee conflict-free edge coloring because all the incident edges to a single node are assigned to colors in such a way that none of the edges should have the same color. …”
Get full text
Article -
1305
Enhanced Isolation Forest-Based Algorithm for Unsupervised Anomaly Detection in Lidar SLAM Localization
Published 2025-04-01“…Using the mean, RMSE, and standard deviation as evaluation metrics, data comparisons confirmed the algorithm’s accuracy. Compared with several SOTA (state-of-the-art) algorithms and ablation studies, our algorithm also showed higher sensitivity.…”
Get full text
Article -
1306
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
1307
EMPLOYING GENETIC ALGORITHM INSPIRED HYPERPARAMETER OPTIMIZATION IN MOBILE NET V2 ARCHITECTURE
Published 2025-03-01“…This paper presents a novel approach for hyperparameter optimization for the MobileNetV2 architecture using a genetic algorithm. The proposed approach aims to automate the hyperparameter tuning leading to performance enhancement. …”
Get full text
Article -
1308
A Method to Reduce the Algorithm Complexity of the Single-Photodiode-per-Polarization Coherent Receiver
Published 2020-01-01“…Other than reducing the overall algorithm complexity, the new method also make the SCR more robust to laser frequency offset compared with the existing heterodyne detection based FRA. …”
Get full text
Article -
1309
Pasireotide-induced hyperglycemia in Cushing’s disease and Acromegaly: A clinical perspective and algorithms proposal
Published 2024-12-01“…Pasireotide is an effective treatment for both Cushing’s disease (CD) and acromegaly due to its ability to suppress adrenocorticotropic hormone and growth hormone, and to normalize insulin-like growth factor-1 levels, resulting in tumor shrinkage. However, it may also cause hyperglycemia as a side effect in some patients. …”
Get full text
Article -
1310
Application of the Different Machine Learning Algorithms to Predict Dry Matter Intake in Feedlot Cattle
Published 2025-01-01“…It is recommended that the interpretation of model consistency should also consider MAE, MAPE, MSE, and RMSE values. In the current study, all machine learning algorithms yielded similar and lower performance metrics. …”
Get full text
Article -
1311
Privacy Risk Assessment of Medical Big Data Based on Information Entropy and FCM Algorithm
Published 2024-01-01“…However, the high sensitivity and privacy of medical data also bring serious security challenges. A privacy risk assessment model combining information entropy and fuzzy C-means clustering algorithm is proposed to address this issue. …”
Get full text
Article -
1312
Evaluation of genetic algorithm alternatives for wind speed modeling using grey relational analysis
Published 2025-04-01“…Therefore, this paper focuses on parameter estimates of the Weibull distribution using genetic algorithm (GA) optimization based on the maximum likelihood (ML) method. …”
Get full text
Article -
1313
Parameter Prediction for Metaheuristic Algorithms Solving Routing Problem Instances Using Machine Learning
Published 2025-03-01“…In this work, we explore the application of machine learning algorithms to suggest suitable parameter values. We propose a methodology to use k-nearest neighbours and artificial neural network algorithms to predict suitable parameter values based on instance features. …”
Get full text
Article -
1314
Hybrid Approach for Protein Secondary Structure Prediction with KNN, SVM, and Neural Network Algorithms
Published 2025-06-01“…In this study, we propose a hybrid approach integrating K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Neural Network (NN) algorithms. We perform an in-depth analysis using various metrics, including accuracy, Q3 score, ROC, and precision-recall curves. …”
Get full text
Article -
1315
YOLO-Wheat: A More Accurate Real-Time Detection Algorithm for Wheat Pests
Published 2024-12-01“…Additionally, mAP@0.5:0.95 reached 46.5%, marking a 1.7% improvement. YOLO-Wheat also performs better than other popular object detection algorithms (YOLOv5, YOLOv10, RT-DETR), and the model is successfully deployed for simple real-time detection. …”
Get full text
Article -
1316
Coupling of green building construction based on particle Swarm optimizing neural network algorithm
Published 2025-01-01“…The purpose is to strengthen safety risk management in green building construction by combining particle swarm optimisation with neural network algorithms. A risk coupling performance comparison was conducted between traditional and research algorithms. …”
Get full text
Article -
1317
COVID-19 World Vaccine Adverse Reactions Based on Machine Learning Clustering Algorithm
Published 2021-05-01“…This study compared four clustering algorithms using the WEKA tool. Furthermore, it details the datasets in terms of different variables of precision, cluster case, number of iterations, time, and present the findings of these papers, and which clustering algorithms used and the accuracy of these algorithms. …”
Get full text
Article -
1318
A Novel Method for News Recommendation on Websites Using the Clustered-Vectors Optimization Algorithm
Published 2025-01-01“…Similarly, the English language dataset, such as Indian news, also demonstrated high performance, with the CVO algorithm achieving an accuracy of 99.90%, a precision of 99.41%, a recall of 99.62%, and an F1-score of 99.53%.…”
Get full text
Article -
1319
Comparative Review of Multi-Objective Optimization Algorithms for Design and Safety Optimization in Electric Vehicles
Published 2024-01-01“…The comparative results, based on four performance indicators—hypervolume (HV), inverted generational distance (IGD), averaged Hausdorff distance <inline-formula> <tex-math notation="LaTeX">$\left ({{ \Delta _{p} }}\right)$ </tex-math></inline-formula>, and spread—reveal that SLMEA emerged as the best algorithm, not only for RWMOP-BEV but also across other benchmark sets, including DTLZ problems and other real-world multi-objective optimization problems.…”
Get full text
Article -
1320
ResM-FusionNet for efficient landslide detection algorithm with a hybrid architecture
Published 2025-04-01Get full text
Article