-
2201
SPARQ: Efficient Entanglement Distribution and Routing in Space–Air–Ground Quantum Networks
Published 2024-01-01“…Existing quantum routing algorithms focus on stationary ground nodes and utilize link distance as an optimality metric, which is unrealistic for dynamic systems, like SPARQ. …”
Get full text
Article -
2202
Polarization of road target detection under complex weather conditions
Published 2024-12-01“…A multi-scale detection network is also designed to fully extract and fuse multi-scale feature information from receptive fields, channels, and spaces in different dimensions. Additionally, a dataset of Polarized Images of Road Targets in Complex Weather conditions (PIRT-CW) is proposed for training and evaluation. …”
Get full text
Article -
2203
Machine learning with hyperparameter optimization applied in facies-supported permeability modeling in carbonate oil reservoirs
Published 2025-04-01“…There is a need to identify a suitable parameter space, especially when the target variable range is changing. ML performance was evaluated with four evaluation metrics (RMSE, MAE, R2, and Adjusted R2). …”
Get full text
Article -
2204
DEMOGRAPHIC CHARACTERISTICS OF THE NEW SILK ROAD PASSAGE ZONE
Published 2022-07-01“…Then this set of indicators was aggregated into the corresponding socio-demographic index using the evaluation algorithm developed earlier by V. S. Tikunov [1997]. …”
Get full text
Article -
2205
Predicting future morphological changes of lesions from radiotracer uptake in 18F-FDG-PET images.
Published 2013-01-01“…Evaluation of segmentation results indicates that our proposed segmentation algorithm has a mean dice similarity coefficient of 85.75 ± 1.75%. …”
Get full text
Article -
2206
Optimization Configuration Method of Energy Storage Considering Photovoltaic Power Consumption and Source-Load Uncertainty
Published 2025-01-01“…Subsequently, the objective function, which seeks to minimize the total daily operating cost of the energy storage system and the PV abandonment rate, is constructed using the evaluation-based function method. The constraints, including node voltage and energy storage device, are considered, and the model is solved using the improved grey wolf optimization algorithm. …”
Get full text
Article -
2207
Low latency Montgomery multiplier for cryptographic applications
Published 2021-07-01“…PKC systems such as ECC and RSA is implemented for different security services such as key exchange between sender, receiver and key distribution between different network nodes and authentication protocols. …”
Get full text
Article -
2208
A Distributed Detection Method for Quality-related Faults in Complex Non-stationary Industrial Processes
Published 2024-11-01“…Traditional quality-related fault detection methods cannot detect abnormalities on time, leading to the transfer and evolution of faults between different operational units of industrial processes. …”
Get full text
Article -
2209
Efficient and practical Hamiltonian simulation from time-dependent product formulas
Published 2025-03-01“…The quantum algorithms we develop have provably better scaling (in terms of gate complexity and circuit depth) than a naive application of well-known Trotter formulas, for systems where the evolution is determined by a Hamiltonian with different energy scales (i.e., one part is “large” and another part is “small”). …”
Get full text
Article -
2210
Evolving Camouflages: A User-Centric AI Approach for Game Aesthetics
Published 2025-01-01“…This project investigates the use of an evolutionary algorithm for texture generation and allows users to choose and manipulate camouflage patterns. …”
Get full text
Article -
2211
Implementation and Applications of Intelligent Batch Processing Technology for Isotope Injection Profile Logging Interpretation
Published 2024-02-01“…Through integrated operation on the national major scientific and technological integration platform CIFLog, the single well processing time is reduced from 30~60minutes to 30 seconds, and the manual intervention rate is less than 12%, verifying the effectiveness of the processing process and algorithm.…”
Get full text
Article -
2212
Comparison between MDDV and VADD routing protocols in VANET (Case Study)
Published 2024-04-01“… Routing is the process of delivering a packet from a source to a destination in the network using a routing algorithm that tries to create an efficient path. The path should be created with minimum overhead and bandwidth consumption. …”
Get full text
Article -
2213
A Survey of Localization in Wireless Sensor Network
Published 2012-12-01“…In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.…”
Get full text
Article -
2214
Retrospective Illumination Correction of Retinal Images
Published 2010-01-01“…This allows us to express the derivatives of the entropy criterion analytically, which enables efficient use of gradient-based optimization algorithms. Seven different gradient- and nongradient-based optimization algorithms were initially tested on a set of 40 simulated retinal images, generated by a model of the respective image acquisition system. …”
Get full text
Article -
2215
An Improved Machine Learning-Based Method for Unsupervised Characterisation for Coral Reef Monitoring in Earth Observation Time-Series Data
Published 2025-04-01“…The workflow incorporates depth correction using Lyzenga’s algorithm and superpixel analysis, culminating in an unsupervised classification of reef areas using KMeans. …”
Get full text
Article -
2216
A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS
Published 2025-02-01“…A method is proposed to enhance the efficiency of attacks on APUFs by preliminarily selecting an appropriate machine learning algorithm using PUF models. This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. …”
Get full text
Article -
2217
A metaheuristic to support the distribution of COVID-19 vaccines
Published 2021-10-01“…Effective analysis was obtained in the evaluation of the proposed algorithm, both in terms of computational effort and the quality of the final solution. …”
Get full text
Article -
2218
Attention-Based Hypergraph Neural Network: A Personalized Recommendation
Published 2025-06-01“…To address the limitations of existing studies in multimodal heterogeneous data fusion and high-order relationship modeling, this research proposes a Heterogeneous Hypergraph and Attention-based Online Course Recommendation (HHAOCR) algorithm. By constructing a heterogeneous hypergraph structure encompassing three entity types (students, instructors, and courses), we innovatively designed hypergraph convolution operators to achieve bidirectional vertex-hyperedge information aggregation, integrated with a dynamic attention mechanism to quantify important differences among entities. …”
Get full text
Article -
2219
Spatio-Temporal Characteristics of the Morphological Development of Gully Erosion on the Chinese Loess Plateau
Published 2025-08-01“…The erosion and deposition on a gully slope were quantified using the M3C2 algorithm. The results show that the proportion of sediment yield of the gully slope in the whole slope–gully system ranged from 81.5% to 99.7% for different flow discharges (25, 40, 55, 70, and 85 L/min). …”
Get full text
Article -
2220
Digital Sovereignty in times of AI: between perils of hegemonic agendas and possibilities of alternative approaches
Published 2024-12-01“…This article explores contemporary discourses on digital sovereignty, highlighting how different ideological positions shape these conversations. …”
Get full text
Article