-
1781
Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study
Published 2025-06-01“…It allows us to put forward the different evaluation challenges that they raise, and the similar to slightly better cost vs. security tradeoff that the leakage-resilient PRF offers in our experiments. …”
Get full text
Article -
1782
Assessing Crash Reduction at Stop-Controlled Intersections: A Before-After Study of LED-Backlit Signs Using Crash and Conflict Data
Published 2025-04-01“…Microscopic models based on observed turning movement counters (TMCs) were calibrated for conflict estimation using a genetic algorithm (GA). Generalized linear models (GLMs) estimated accident and conflict frequencies under different treatment scenarios. …”
Get full text
Article -
1783
Collaborative Optimization Planning Method for Distribution Network Considering “Hydropower, Photovoltaic, Storage, and Charging”
Published 2024-01-01“…The optimal ideal solution is used for screening to obtain the optimal planning scheme under different scenarios. Then, a comprehensive evaluation is carried out on the optimal planning schemes of different scenarios. …”
Get full text
Article -
1784
PISCFF-LNet: A Method for Autonomous Flight of UAVs Based on Lightweight Road Extraction
Published 2025-03-01“…Finally, we applied the algorithm to a UAV, using a PID-based flight-control algorithm. …”
Get full text
Article -
1785
Blind source separation and unmanned aerial vehicle classification using CNN with hybrid cross-channel and spatial attention module
Published 2025-07-01“…The experimental results indicate that the mean absolute error (MAE) of the original algorithm was 14.58%, while the MAE of the improved FastICA decreased by 10.31%, dropping to 4.27%. …”
Get full text
Article -
1786
Research on the Injection Mold Design and Molding Process Parameter Optimization of a Car Door Inner Panel
Published 2022-01-01“…We established the objective function model with gate position as the independent variable, and used a multi-population genetic algorithm to solve the optimal position of the function model to get the best gate position. …”
Get full text
Article -
1787
Clustering-Based Thermography for Detecting Multiple Substances Under Large-Scale Floating Covers
Published 2024-12-01“…Cooling constants are used to reconstruct thermal images, and clustering algorithms are explored to segment and identify different material states beneath the covers. …”
Get full text
Article -
1788
An Intelligent Track Segment Association Method Based on Characteristic-Aware Attention LSTM Network
Published 2025-05-01“…The algorithm can segment and temporally align track segments containing multi-dimensional characteristics. …”
Get full text
Article -
1789
Dementia Scale Score Classification Based on Daily Activities Using Multiple Sensors
Published 2022-01-01“…We then developed a feature extraction method related to daily activity patterns based on a clustering algorithm and analyzed its effectiveness. In the experimental evaluation, we trained binary classification models to classify dementia scale scores based on the Mini-Mental State Examination (MMSE) from these datasets. …”
Get full text
Article -
1790
Research on RF Intensity Temperature Sensing based on 1D-CNN
Published 2025-04-01“…Finally, the Root Mean Square Error (RMSE) is used as the evaluation index, and the performance of 1D-CNN is compared with the traditional algorithms (maximum-value method, centroid method and Gaussian fitting method) to analyze its performance under different temperature conditions.…”
Get full text
Article -
1791
MULTI-SENSORY BRANDING AS A TOOL FOR THE FORMATION OF A POSITIVE IMAGE OF THE HIGHER EDUCATION INSTITUTION
Published 2015-05-01“…The author also offers the algorithm of creation the educational brand, based on the five senses of consumers, consisting of six interrelated stages: audit of the sensory elements of brand, the search for ideas, the choice of scenario, creating an image, the implementation of something intended, and the results evaluation. …”
Get full text
Article -
1792
Risk Assessment for Water Disaster of Karst Tunnel Based on the Weighting of Reliability Measurement and Improved Extension Cloud Model
Published 2023-01-01“…Secondly, according to the two different entropy algorithms of the extension cloud model, an improved extension cloud model is proposed based on the entropy algorithm fusion of game theory. …”
Get full text
Article -
1793
Heterogeneity-Aware Personalized Federated Neural Architecture Search
Published 2025-07-01“…Furthermore, we develop a model-heterogeneous FL algorithm called heteroFedAvg to facilitate collaborative model training for the discovered personalized models. …”
Get full text
Article -
1794
Integrating deformable CNN and attention mechanism into multi-scale graph neural network for few-shot image classification
Published 2025-01-01“…In order to extract comprehensive and critical feature information, a new CA-MFE algorithm is proposed. The algorithm first utilizes different convolution kernels in CNN to extract multi-scale local feature information, and then based on the global feature extraction ability of attention mechanism, parallel processing of channel and spatial attention mechanism is used to extract multidimensional global feature information. …”
Get full text
Article -
1795
Investigating the Stroke- and Aging-Related Changes in Intermuscular Coupling by Refined Composed Multiscale Fuzzy Entropy
Published 2025-01-01“…Meanwhile, the influence of aging and stroke on the human neuromuscular system is comprehensively studied by a stable and reliable entropy algorithm, and it contributes to the rehabilitation clinical evaluation of stroke patients.…”
Get full text
Article -
1796
Unsupervised Salient Object Detection by Aggregating Multi-Level Cues
Published 2018-01-01“…Extensive experimental results demonstrate that the proposed algorithm performs favorably against the state-of-art saliency detection methods in terms of different evaluation metrics on several benchmark datasets.…”
Get full text
Article -
1797
Red Wine Classification Using SVM and RBF Kernel
Published 2024-12-01“…The duration of fermentation and the materials used will give different quality products. Nowadays technology is present to provide solutions to these problems by using the SVM algorithm on Machine Learning. …”
Get full text
Article -
1798
The impact of vehicle moving violations and freeway traffic flow on crash risk: An application of plugin development for microsimulation.
Published 2017-01-01“…A Fuzzy C-mean Clustering algorithm was developed to identify high risk states in different road segments over time. …”
Get full text
Article -
1799
Treatment for rheumatic polymyalgia
Published 2013-03-01“…The role of nonsteroidal anti-inflammatory drugs in the treatment of RP is also evaluated. An algorithm is proposed for the management of a patient with RP.…”
Get full text
Article -
1800
Enhancing Multi-Key Fully Homomorphic Encryption with Efficient Key Switching and Batched Multi-Hop Computations
Published 2025-05-01“…Our approach eliminates the need for an auxiliary Gentry-Sahai-Waters (GSW)-type scheme, simplifying the design and significantly reducing the public key size. We propose novel algorithms for evaluation key generation and key switching that simplify the computation while allowing each party to independently precompute and share its evaluation keys, thereby reducing both computational overhead and storage costs. …”
Get full text
Article