-
41
UAV-Assisted Unbiased Hierarchical Federated Learning: Performance and Convergence Analysis
Published 2025-01-01Get full text
Article -
42
Stochastic black-box optimization using multi-fidelity score function estimator
Published 2025-01-01Get full text
Article -
43
-
44
Private Collaborative Edge Inference via Over-the-Air Computation
Published 2025-01-01Get full text
Article -
45
On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations
Published 2021-03-01“…The paper proposes two implementations of the scheme: extended and simplified. The extended scheme is closer to the process of analyzing a program by an analyst, since it includes the steps of disassembly and translation into intermediate code, while in the simplified scheme these steps are excluded. …”
Get full text
Article -
46
Theoretical studies results for a mathematical model of a road roller turn
Published 2022-06-01“…As a result of the developed mathematical model, a program code was built in the MATLAB software product, which formed the basis of theoretical studies that made it possible to fully study the influence of the design and operational parameters of the machine on the motion trajectory and positioning accuracy.Results. …”
Get full text
Article -
47
An Efficient Quantized Message Passing Receiver Design for SCMA Systems
Published 2025-05-01“…Sparse code multiple access (SCMA) has been considered as an efficient technique to provide both massive connectivity and high spectrum efficiency for future machine-type wireless networks. …”
Get full text
Article -
48
Distributed Software Build Assurance for Software Supply Chain Integrity
Published 2024-10-01“…We design and build a software build assurance scheme detecting if there have been injections or modifications in the various steps in the software supply chain, including the source code, compiling, and distribution. …”
Get full text
Article -
49
Enhancing Biomedical Semantic Annotations through a Knowledge Graph-Based Approach
Published 2023-05-01“…However, this information has various access challenges due to the need for precise machine-interpretable semantic metadata required by search engines. …”
Get full text
Article -
50
Multi-strategy enhanced marine predator algorithm: performance investigation and application in intrusion detection
Published 2025-02-01“…The source code of this research can be downloaded at https://github.com/RuiZhong961230/MEMPA .…”
Get full text
Article -
51
A semi-automated algorithm for designing stellarator divertor and limiter plates and application to HSX
Published 2024-01-01“…Heat transport is modelled using the EMC3-Lite code, which uses an anisotropic diffusion model. …”
Get full text
Article -
52
A reliable NLOS error identification method based on LightGBM driven by multiple features of GNSS signals
Published 2024-11-01“…Finally, we introduce the LightGBM model to establish an effective correlation between signal features and satellite visibility and adopt a multifeature-driven scheme to achieve reliable identification of NLOSs. …”
Get full text
Article -
53
The Training Method for Digital Data Operation
Published 2020-09-01“…While the modern IT and data sources contain tools for working with data, which are available to a wide range of users without the need to write the code. Materials and methods. The study is based on the theoretical materials and the practice of operation with digital data in management processes. …”
Get full text
Article -
54
Experimental and Numerical Investigation on the Bearing Behavior of Curved Continuous Twin I-Girder Composite Bridge with Precast Concrete Slab
Published 2021-01-01“…These above may indicate that the TGCB designed according to Chinese codes has good safety reserve and ductility. From parameter analysis results, it was concluded that the TGCB with full-support construction scheme has larger yield load and ultimate load compared with the one with erecting machine construction scheme. …”
Get full text
Article -
55
Lossless Compression of Malaria-Infected Erythrocyte Images Using Vision Transformer and Deep Autoencoders
Published 2025-04-01“…To ensure no loss in reconstructed image quality, we further compress the residuals produced by these autoencoders using the Huffman code. Simulation results show that the proposed method achieves lower overall bit rates and thus higher compression ratios than traditional compression schemes such as JPEG 2000, JPEG-LS, and CALIC. …”
Get full text
Article -
56
Explicit collocation algorithm for the nonlinear fractional Duffing equation via third-kind Chebyshev polynomials
Published 2025-06-01“…The main advantages of the proposed method are that it does not require a huge number of retained modes, simply a few terms, and does not exhaust the machine used to render the codes.…”
Get full text
Article -
57
Efficient Channel Prediction Technique Using AMC and Deep Learning Algorithm for 5G (NR) mMTC Devices
Published 2022-01-01“…Efficient utilisation of adaptive modulation and coding ensures the quality transmission of information bits through the significant reduction in bit error rate (BER). …”
Get full text
Article -
58
Computational complexity when constructing rational plans for program execution in a given field of parallel computers
Published 2022-12-01“…An iterative approach to improving heuristic methods favors developing optimal schemes for solving the objective problem.Conclusions. …”
Get full text
Article -
59
Entropy of Neuronal Spike Patterns
Published 2024-11-01“…Finally, we discuss strategies to overcome these challenges, including dimensionality reduction techniques, advanced entropy estimators, sparse coding schemes, and the integration of machine learning approaches. …”
Get full text
Article -
60
Symbolic Framework for Evaluation of NOMA Modulation Impairments Based on Irregular Constellation Diagrams
Published 2025-05-01“…In contrast to legacy modulation and coding schemes (MCSs), NOMA MCSs typically have irregular symbol constellations with asymmetric symbol decision regions affecting synchronization at the receiver. …”
Get full text
Article