-
1881
Optimization Configuration Method of Energy Storage Considering Photovoltaic Power Consumption and Source-Load Uncertainty
Published 2025-01-01“…Subsequently, the objective function, which seeks to minimize the total daily operating cost of the energy storage system and the PV abandonment rate, is constructed using the evaluation-based function method. The constraints, including node voltage and energy storage device, are considered, and the model is solved using the improved grey wolf optimization algorithm. …”
Get full text
Article -
1882
Low latency Montgomery multiplier for cryptographic applications
Published 2021-07-01“…PKC systems such as ECC and RSA is implemented for different security services such as key exchange between sender, receiver and key distribution between different network nodes and authentication protocols. …”
Get full text
Article -
1883
Evolving Camouflages: A User-Centric AI Approach for Game Aesthetics
Published 2025-01-01“…This project investigates the use of an evolutionary algorithm for texture generation and allows users to choose and manipulate camouflage patterns. …”
Get full text
Article -
1884
Implementation and Applications of Intelligent Batch Processing Technology for Isotope Injection Profile Logging Interpretation
Published 2024-02-01“…Through integrated operation on the national major scientific and technological integration platform CIFLog, the single well processing time is reduced from 30~60minutes to 30 seconds, and the manual intervention rate is less than 12%, verifying the effectiveness of the processing process and algorithm.…”
Get full text
Article -
1885
Comparison between MDDV and VADD routing protocols in VANET (Case Study)
Published 2024-04-01“… Routing is the process of delivering a packet from a source to a destination in the network using a routing algorithm that tries to create an efficient path. The path should be created with minimum overhead and bandwidth consumption. …”
Get full text
Article -
1886
A Survey of Localization in Wireless Sensor Network
Published 2012-12-01“…In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.…”
Get full text
Article -
1887
Retrospective Illumination Correction of Retinal Images
Published 2010-01-01“…This allows us to express the derivatives of the entropy criterion analytically, which enables efficient use of gradient-based optimization algorithms. Seven different gradient- and nongradient-based optimization algorithms were initially tested on a set of 40 simulated retinal images, generated by a model of the respective image acquisition system. …”
Get full text
Article -
1888
An Improved Machine Learning-Based Method for Unsupervised Characterisation for Coral Reef Monitoring in Earth Observation Time-Series Data
Published 2025-04-01“…The workflow incorporates depth correction using Lyzenga’s algorithm and superpixel analysis, culminating in an unsupervised classification of reef areas using KMeans. …”
Get full text
Article -
1889
A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS
Published 2025-02-01“…A method is proposed to enhance the efficiency of attacks on APUFs by preliminarily selecting an appropriate machine learning algorithm using PUF models. This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. …”
Get full text
Article -
1890
A metaheuristic to support the distribution of COVID-19 vaccines
Published 2021-10-01“…Effective analysis was obtained in the evaluation of the proposed algorithm, both in terms of computational effort and the quality of the final solution. …”
Get full text
Article -
1891
Multi-objective clustering: a kernel based approach using Differential Evolution
Published 2019-07-01“…A multi-objective algorithm is always favoured over a single objective algorithm as it considers different aspects of a dataset in the form of various objectives. …”
Get full text
Article -
1892
Cross-validation of methods for the quantitative determination of phenazepam and its active metabolite in human blood plasma at various extractions
Published 2024-11-01“…The statistical approaches used in the work have confirmed the reproducibility of the results of different sample preparation methods. In addition to cross-validation, the statistical algorithm from this paper using Bland – Altman analysis can be successfully employed to assess accuracy and precision during bioanalytical method validation and evaluation of the acceptance of analytical runs, as well as to determine the level of reproducibility of incurred samples.…”
Get full text
Article -
1893
SNet: A novel convolutional neural network architecture for advanced endoscopic image classification of gastrointestinal disorders
Published 2025-08-01“…The proposed convolutional neural network (CNN) model is comprised of six blocks placed at different layers. To enable the exhaustive evaluation of proposed framework across different datasets, the model has undergone training on a very complex HyperKvasir dataset, and later tested on Kvasir v1 and v2 datasets. …”
Get full text
Article -
1894
Multi-criteria vehicle routing problem for a real-life parcel locker-based delivery
Published 2025-07-01“…However, results also indicate that both Tabu Search and Genetic Algorithm have different effectiveness in different cases. …”
Get full text
Article -
1895
Integrating Time Series Anomaly Detection Into DevOps Workflows
Published 2025-01-01“…Moreover, to benchmark the dataset, we first label a subset of the dataset based on feedback from the DevOps experts within the industry context. Then six different algorithms are employed on the dataset and their performance in anomaly detection is evaluated using three different Area Under the Curve (AUC) metrics. …”
Get full text
Article -
1896
Data-driven prediction of cardiovascular and cerebrovascular diseases in a nationwide study
Published 2025-07-01“…The logistic regression model incorporating variables selected by the LASSO algorithm exhibited superior predictive performance relative to other models, although the differences were not statistically significant. …”
Get full text
Article -
1897
Design, Mathematical Modeling, and Control of an Underactuated 3-DOF Experimental Helicopter
Published 2024-01-01“…The system is considered an essential benchmark for the development and evaluation of control algorithms and identification methods as it mimics real helicopters and UAVs. …”
Get full text
Article -
1898
Optimizing the core loading pattern and fuel composition in a hexagonal small modular nuclear reactor via ANN-PSO approach
Published 2025-06-01“…Various models featuring hexagonal FAs, containing different mixed fuels, were tested through a series of simulations. …”
Get full text
Article -
1899
Research on the Reliability of Intelligent Dispatching Management System for Open-pit Mines
Published 2022-10-01“…At the same time, considering that different service instance deployment methods have a key impact on the reliability of the scheduling system, this paper proposes a step-by-step traversal algorithm to obtain the best service instance deployment method, and then obtain the most reliable scheduling system deployment method. …”
Get full text
Article -
1900
The ability to assess the state of the fundus in patients with lens opacities of varying intensity, including patients with type 2 diabetes mellitus, using quantitative analysis of...
Published 2020-05-01“…In order to better fix the details of the fundus images with lens opacities using a computer algorithm with a filter system, evaluation scales have been developed – the clarity score scale and the blur score scale. …”
Get full text
Article