-
3901
Evaluating end-to-end autonomous driving architectures: a proximal policy optimization approach in simulated environments
Published 2025-07-01“…The study uses the Proximal Policy Optimization (PPO) algorithm within the CARLA simulation environment. …”
Get full text
Article -
3902
Joint Configuration and Optimization of Multi-microgrid Shared Energy Storage Based on Coalition Game
Published 2022-12-01Get full text
Article -
3903
-
3904
Predicting protein–protein interactions in microbes associated with cardiovascular diseases using deep denoising autoencoders and evolutionary information
Published 2025-03-01“…Our findings indicate that DAEPPI is a powerful tool for advancing research in proteomics and could play a pivotal role in the identification of novel therapeutic targets in cardiovascular disease.…”
Get full text
Article -
3905
Innovative Dombi Aggregation Operators in Linguistic Intuitionistic Fuzzy Environments for Optimizing Telecommunication Networks
Published 2025-05-01“…An algorithm is also proposed to address the challenges of handling imprecise data in DM using the LIF dynamic Dombi aggregation approaches. …”
Get full text
Article -
3906
Optimizing Deep Learning Models with Improved BWO for TEC Prediction
Published 2024-09-01Get full text
Article -
3907
An Enhanced Comprehensive Learning Particle Swarm Optimizer with the Elite-Based Dominance Scheme
Published 2020-01-01Get full text
Article -
3908
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
3909
Automated non-destructive phenotyping of Camellia oleifera seedlings based on 3D point clouds
Published 2025-12-01Get full text
Article -
3910
-
3911
-
3912
Deep neural network application in real-time economic dispatch and frequency control of microgrids
Published 2025-03-01“…Finally, a real-time integrated scheduling and control framework for microgrids is constructed. The research results showed that the IRPGC algorithm had an average error of less than 10−5 after 5,000 iterations. …”
Get full text
Article -
3913
Deep Reinforcement Learning Method for Wireless Video Transmission Based on Large Deviations
Published 2025-07-01“…The results demonstrate that the adaptive DRL algorithm described in this paper achieves superior convergence speed and higher cumulative rewards compared to the classical DRL approaches.…”
Get full text
Article -
3914
Maturity Classification and Quality Determination of Cherry Using VNIR Hyperspectral Images and Comprehensive Chemometrics
Published 2024-12-01“…To improve the imaging performance, two spectral pretreatment methods (wavelet transform, standard normal variable transformation and detrend), three feature selection methods (successive projection algorithm, genetic algorithm, and shuffled frog leaping algorithm), and four regression modeling methods (principal components regression, partial least squares regression, least square-support vector regression, convolutional neural network) were employed and compared. …”
Get full text
Article -
3915
Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data
Published 2012-01-01Get full text
Article -
3916
Study on the parameters of the matrix NTRU cryptosystem
Published 2025-03-01“…With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized.MethodsBased on the method of constraining the parameter space in congruent cryptographic algorithms, a method for optimal selection of the parameter space of matrix NTRU cryptographic regimes was proposed. …”
Get full text
Article -
3917
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
3918
-
3919
A VCA Combined MHSA-CNN for Aero-Engine Hot Jet Remote Sensing Mixed Spectral Feature Extraction
Published 2025-03-01“…By comparing with the separately measured actual pure spectra, it was found that the mean RMSE of the hot jet pure spectra extracted by VCA for the two engines was 0.34846, and the mean SAM reached 0.00096, thus validating the effectiveness of the algorithm. …”
Get full text
Article -
3920
Robust Road Surface Classification Using Time Series Augmented Intelligent Tire Sensor Data and 1-D CNN
Published 2025-01-01“…Furthermore, the performance of different CNN architectures is compared and the algorithm with the best performance is suggested. …”
Get full text
Article