-
21
-
22
Machine learning for Internet of things anomaly detection under low-quality data
Published 2022-10-01“…However, the existing schemes ignore the problem of data quality, which leads to the unsatisfactory detection effect in practice. …”
Get full text
Article -
23
Discussing the spectrum of physics-enhanced machine learning: a survey on structural mechanics applications
Published 2024-01-01“…The intersection of physics and machine learning has given rise to the physics-enhanced machine learning (PEML) paradigm, aiming to improve the capabilities and reduce the individual shortcomings of data- or physics-only methods. …”
Get full text
Article -
24
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01“…For shadow stack, balancing security and performance was difficult, and the forward CFI (control-flow integrity) scheme implemented by software was too expensive and difficult to be deployed in practice. …”
Get full text
Article -
25
Generating Anticancer Peptides Sequences Using Seq2Seq Modeling and Machine Learning Methods
Published 2025-01-01Get full text
Article -
26
Machine-learning aided calibration and analysis of porous media CFD models used for rotating packed beds
Published 2024-11-01“…These sensitivity equations are discretized using a finite volume scheme and solved to obtain the sensitivity pressure drop differences at the packing edges. …”
Get full text
Article -
27
Hybrid FRP strengthening of reinforced concrete deep beams: Experimental, theoretical and machine learning-based study
Published 2025-07-01“…A novel and cost-effective hybrid strengthening scheme is proposed comprising glass chopped mat sheets and eco-friendly basalt FRP sheets (GF-BFRP). …”
Get full text
Article -
28
A CONTERPORARYAPPROACH FOR OBTAINING REGULARLY SHAPED ROUGHNESS BY BALL-BURNISHING PROCESS CARIED OUT USINGCNC CONTROLEDMILLING MACHINES
Published 2017-05-01“…A mathematical model developed for generating the sinusoidal curves, which represents needed toolpaths and an algorithm for obtaining the NC-code for corresponding machine tools are presented. …”
Get full text
Article -
29
Flying Robots Teach Floating Robots—A Machine Learning Approach for Marine Habitat Mapping Based on Combined Datasets
Published 2025-03-01“…The methodology implements a machine learning scheme, where knowledge obtained from UAV imagery is embedded (through training) into a classifier that utilizes acoustic backscatter intensity and features derived from the MBES data provided by an ASV. …”
Get full text
Article -
30
Vectorial principles of sensorimotor decoding
Published 2025-07-01“…These findings suggest a unifying vectorial framework for sensory and motor coding, with implications for periprosthetic and brain-machine interface.…”
Get full text
Article -
31
Defining Disease Phenotypes in Primary Care Electronic Health Records by a Machine Learning Approach: A Case Study in Identifying Rheumatoid Arthritis.
Published 2016-01-01“…<h4>Methods</h4>This study linked routine primary and secondary care EHRs in Wales, UK. A machine learning based scheme was used to identify patients with rheumatoid arthritis from primary care EHRs via the following steps: i) selection of variables by comparing relative frequencies of Read codes in the primary care dataset associated with disease case compared to non-disease control (disease/non-disease based on the secondary care diagnosis); ii) reduction of predictors/associated variables using a Random Forest method, iii) induction of decision rules from decision tree model. …”
Get full text
Article -
32
Pyrolysis Kinetics of Pine Waste Based on Ensemble Learning
Published 2025-05-01“…Moreover, the multiclassification in pyrolysis kinetics through the proposed scheme was not able to capture the distribution pattern of target values of the differential method. …”
Get full text
Article -
33
Enhanced Global Ionospheric Mapping Using Deep Ensemble Neural Networks With Uncertainty Quantification
Published 2025-07-01“…This study proposes a deep ensemble method based on neural networks (NNs) that generates high‐accuracy global vertical total electron content (VTEC) maps along with corresponding uncertainty estimates. To develop the machine learning model, we first determined the VTEC time series based on the carrier‐to‐code leveling method using multi‐GNSS observations from global IGS stations. …”
Get full text
Article -
34
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01“…A cryptographically-implemented high-speed source address verification scheme for the hosts in the IPv6 access subnet was proposed.The MAC address was used as the identity of the host machine and bounded with the host’s public key.Then the IPv6 address was derived from the host machine’s public key using the cryptographically generated address algorithm.The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm and stream authentication.The experimental system show that the scheme could ver fy the source addresses of data packets at a loss cost.Thus,it is a secure and feasible scheme.…”
Get full text
Article -
35
ESOMICS: ML-Based Timing Behavior Analysis for Efficient Mixed-Criticality System Design
Published 2024-01-01Get full text
Article -
36
HERGAI: an artificial intelligence tool for structure-based prediction of hERG inhibitors
Published 2025-07-01Get full text
Article -
37
Optimizing Energy and Spectral Efficiency in Mobile Networks: A Comprehensive Energy Sustainability Framework for Network Operators
Published 2025-01-01“…For example, the results show that using higher order modulation coding schemes reduces the probability of a BS falling into class D by 50%. …”
Get full text
Article -
38
Multi-class fault diagnosis of BF based on global optimization LS-SVM
Published 2017-01-01“…Finally, the heuristic error correcting output codes were constructed on the basis of Fisher linear discriminate rate. …”
Get full text
Article -
39
The LED-ID Detection and Recognition Method Based on Visible Light Positioning Using Proximity Method
Published 2018-01-01“…Different from the traditional LED-ID coding and decoding method, we create different features for different LED-ID, and use a machine learning method to identify the LED-ID once the feature extraction and selection of the LED image is achieved with an image processing method. …”
Get full text
Article -
40
Coordinated Scheduling for Zero-Wait RGV/ASR Warehousing Systems with Finite Buffers
Published 2025-06-01“…To address this, the research frames the inbound and outbound problem as a task allocation issue for the RGV/ASR system with a finite buffer, and proposes a collision avoidance strategy and a zero-wait strategy for loaded machines to reallocate tasks. To improve computational efficiency, we introduce an adaptive multi-neighborhood hybrid search (AMHS) algorithm, which integrates a dual-sequence coding scheme and an elite solution initialization strategy. …”
Get full text
Article