-
761
Research on Intelligent Identification Technology for Bridge Cracks
Published 2025-04-01Get full text
Article -
762
Low Speed Longitudinal Control Algorithms for Automated Vehicles in Simulation and Real Platforms
Published 2018-01-01Get full text
Article -
763
Comparison of Noise Reduction Algorithms for Optical Coherence Tomography Images of Skin Melanoma
Published 2020-10-01Get full text
Article -
764
Hybrid Swarm Intelligence and Human-Inspired Optimization for Urban Drone Path Planning
Published 2025-03-01“…To address the challenges of urban drone path planning, this paper proposes an innovative method that combines a path segmentation and prioritized update algorithm with a cubic B-spline curve algorithm. This method enhances both path optimality and smoothness, ensuring safe and efficient navigation in complex urban settings. …”
Get full text
Article -
765
A review: Multi-Objective Algorithm for Community Detection in Complex Social Networks
Published 2025-02-01“…Recently, research on multi-objective optimization algorithms for community detection in complex networks has grown considerably. …”
Get full text
Article -
766
Mechanical product design and manufacturing system based on CNN and server optimization algorithm
Published 2025-04-01“…The path and running time of the server optimization path algorithm have better performance. It can be seen that the research proposed methods have good performance and advantages in mechanical product design services and optimization, which can provide technical references and directions for the development of manufacturing service-oriented enterprises in cloud manufacturing mode.…”
Get full text
Article -
767
Heat Pump Temperature Trajectory Planning Algorithm for Bus Voltage Sag Suppression
Published 2023-05-01Get full text
Article -
768
-
769
Review of Fault Detection and Diagnosis Methods in Power Plants: Algorithms, Architectures, and Trends
Published 2025-06-01“…This review identifies critical research gaps—including the underuse of hybrid models, lack of benchmark datasets, and limited integration between detection and control layers—and offers concrete recommendations for future research. …”
Get full text
Article -
770
Data-driven network intrusion detection using optimized machine learning algorithms
Published 2025-09-01“…This study presents a comprehensive evaluation of machine learning approaches for network intrusion detection, comparing the performance of Decision Trees (DT), Random Forest (RF), K-Nearest Neighbors (K-NN), Gradient Boosting (GB), and Logistic Regression (LR) algorithms. …”
Get full text
Article -
771
Queueing modeling and optimization of hybrid electric vehicle infrastructures using evolutionary algorithms
Published 2025-03-01“…The novelty of the proposed research is to formulate the cost optimization problem and demonstrate optimal converging outcomes through an in-depth comparative investigation of multiple evolutionary algorithms, including the particle swarm optimization (PSO), cuckoo search (CS), grey wolf (GW), and honey badger (HB) optimizers. …”
Get full text
Article -
772
-
773
The sovereignty-internationalism paradox in AI governance: digital federalism and global algorithmic control
Published 2025-06-01“…AI systems simultaneously reinforce national sovereignty while demanding global cooperation, posing a fundamental challenge to governance frameworks. Through a comparative analysis of the European Union’s AI Act and China’s Social Credit System, this research explores how AI governance can either enable state authority or necessitate transnational coordination. …”
Get full text
Article -
774
Objective method of comparing DNA microarray image analysis systems
Published 2004-06-01Get full text
Article -
775
Comparative Analysis of Anomaly Detection Techniques Using Generative Adversarial Network
Published 2023-12-01Get full text
Article -
776
Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices
Published 2025-06-01“…Based on these results, AES128 is suitable for high-capacity IoT platforms prioritizing strong encryption, while SIMON and SPECK are preferable for resource-constrained devices, with XTEA serving as a balanced alternative. This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.…”
Get full text
Article -
777
Infrared spectrum target recognition and positioning technology based on image segmentation algorithm
Published 2025-07-01“…The existing image segmentation and recognition algorithms have low accuracy and large positioning errors when processing infrared images. …”
Get full text
Article -
778
Comparison of Energy Consumption Optimization in Sugar Factory Using Meta-Heuristic Algorithms
Published 2025-06-01Get full text
Article -
779
Comparing AI-Generated Stimuli and Photos: Visual Search Study
Published 2025-06-01Get full text
Article -
780
A Comparative Study of Rhythmic Complexity Measures in Music Performance
Published 2024-12-01“…The research focuses on five rhythmic complexity measures: Lempel-Ziv, Keith, Tanguiane, Weighted Note-to-Beat Distance (WNBD), and Pressing. …”
Get full text
Article