-
5201
Enhancing Streamflow Prediction Accuracy: A Comprehensive Analysis of Hybrid Neural Network Models with Runge–Kutta with Aquila Optimizer
Published 2024-11-01“…Abstract This study investigates the efficacy of hybrid artificial neural network (ANN) methods, incorporating metaheuristic algorithms such as particle swarm optimization (PSO), genetic algorithm (GA), gray wolf optimizer (GWO), Aquila optimizer (AO), Runge–Kutta (RUN), and the novel ANN-based Runge–Kutta with Aquila optimizer (LSTM-RUNAO). …”
Get full text
Article -
5202
The Impact of Feature Extraction in Random Forest Classifier for Fake News Detection
Published 2024-12-01“…The influence of fake news has become a pressing social problem, shaping public opinion in important events such as elections. This research focuses on detecting and classifying fake news using the Random Forest algorithm by investigating the impact of feature extraction techniques on classification accuracy, this study specifically employs the TF-IDF method. …”
Get full text
Article -
5203
Sentiment Analysis of TIMNAS Indonesia's Participation in the Asian Cup U23 2024 on X Using Naive Bayes and SVM
Published 2024-08-01“…The analysis results indicate that the SVM algorithm achieves a higher % accuracy rate of 95% compared to Naive Bayes, which achieves 87%. …”
Get full text
Article -
5204
Stackelberg Game Based on Trajectory Prediction for Lane Change in Mixed Traffic
Published 2025-01-01Get full text
Article -
5205
-
5206
-
5207
Medical Dataset Classification: A Machine Learning Paradigm Integrating Particle Swarm Optimization with Extreme Learning Machine Classifier
Published 2015-01-01“…This paradigm integrates the successful exploration mechanism called self-regulated learning capability of the particle swarm optimization (PSO) algorithm with the extreme learning machine (ELM) classifier. …”
Get full text
Article -
5208
Online electric network capacity assesment
Published 2020-09-01“…The aim of the work is to develop an algorithm for assessing the throughput of the electric network. …”
Get full text
Article -
5209
-
5210
Control Strategy for PHEB Based on Actual Driving Cycle with Driving Style Characteristic
Published 2019-01-01Get full text
Article -
5211
Modelling of Green function in a rectangular room based upon the geometrical-filtration model
Published 2014-03-01Get full text
Article -
5212
An Inspiration Recommendation System for Automotive Styling Design Based on User Behavior Data and Group Preferences
Published 2024-11-01“…Firstly, the K-means algorithm is employed to cluster users based on a variety of features. …”
Get full text
Article -
5213
An Improved Reduced-Dimension Robust Capon Beamforming Method Using Krylov Subspace Techniques
Published 2024-11-01Get full text
Article -
5214
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01“…The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.…”
Get full text
Article -
5215
AFD: Defending Convolutional Neural Networks Without Using Adversarial Samples
Published 2025-01-01“…The vulnerability of deep neural networks to adversarial attacks has attracted much research effort. Still, studies have shown that it is challenging to simultaneously achieve both strong robustness to adversarial attacks and low degradation in the performance on the original task, as there is always a trade-off between the two objectives. …”
Get full text
Article -
5216
Accurate Solar Radiation Forecasting Through Feature-Enhanced Decision Trees and Wavelet Decomposition
Published 2025-01-01“…This study explores the efficacy of the decision tree algorithm in predicting solar power generation, addressing the inherent variability in photovoltaic (PV) energy production due to weather conditions. …”
Get full text
Article -
5217
Disturbance Rejection and Uncertainty Analysis in Wind Turbines Using Model Predictive Control
Published 2025-05-01“…We have tailored the algorithm to the practical parameters of the National Renewable Energy Laboratory’s (NREL) Controls Advanced Research Turbine (CART) model. …”
Get full text
Article -
5218
Crowd-based collaboration caching mechanism in smart identifier network
Published 2018-12-01“…Smart identifier network (SINET) is an innovative network architecture.Through dynamic collaboration of service resource,function groups and physical components,the network scalability,resource utilization and service quality were effectively improved by SINET,and an effective solution for the development of industrial Internet of things(IoT) could be provided.To promote content delivery in resource-constrained IoT,caching function was introduced in network components by SINET,and the bandwidth waste caused by traffic redundancy in resource-constrained node could be reduced.Therefore,how to efficiently cache content became an important research topic.Based on SINET architecture,a crowd-based collaboration cache (C2Cache) mechanism was proposed in this scheme.According to the actual network topology,the caching function group was dynamically created and optimized by C2Cache,and a function group as crowd minimum unit to execute the maximum benefit cache (MBC) algorithm was defined to maximize the caching space efficiency.With the self-developed emulation system,named EmuStack,the performance of C2Cache was evaluated.The experimental results show that,comparing with LCE,Random,Prob Cache,LCD and Greedy caching mechanisms,the cache hit rate can be improved effectively,then the average access time can be reduced significantly by C2Cache.In the simulated network scenario,the performance increases 15% to 30%.…”
Get full text
Article -
5219
Pearson Autocovariance Distinct Patterns and Attention-Based Deep Learning for Wind Power Prediction
Published 2022-01-01“…Swift development in wind power and extension of wind generation necessitates significant research in numerous fields. Due to this, wind power is weather dependent; it is fluctuating and is sporadic over numerous time periods. …”
Get full text
Article -
5220
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives
Published 2025-05-01“…Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations, researchers have been working on building post-quantum homomorphic encryption (PQHE) algorithms. …”
Get full text
Article