-
1981
Predicting CO2 adsorption in KOH-activated biochar using advanced machine learning techniques
Published 2025-07-01“…Sensitivity analysis further indicated all input parameters’ correlation with CO2 adsorption, while SHAP analysis identified pressure and temperature as critical factors. …”
Get full text
Article -
1982
Lithium-Ion Battery Degradation Based on the CNN-Transformer Model
Published 2025-01-01“…Regarding the instability of single-battery data in the CNN-Transformer model, statistical analysis is conducted to analyze the experimental results. …”
Get full text
Article -
1983
Local differential privacy-based frequent sequence mining
Published 2022-06-01“…We conduct theoretical analysis on error-bound and extensive experiments on both real-world and synthetic datasets. …”
Get full text
Article -
1984
Enhancing Reliability in Redundant Homogeneous Sensor Arrays with Self-X and Multidimensional Mapping
Published 2025-06-01“…The approach is initially validated on synthetic data from tunnel magnetoresistance (TMR) sensors to facilitate method analysis and comparison. …”
Get full text
Article -
1985
YOLOv8 and point cloud fusion for enhanced road pothole detection and quantification
Published 2025-04-01“…The model processes a single image in 0.23 seconds. Furthermore, the error rates for perimeter, surface area, and depth detection are limited to within $$4\%$$ , $$5\%$$ , and $$4\%$$ , respectively.…”
Get full text
Article -
1986
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
Get full text
Article -
1987
Decision tree for severity assessment of neurodegenerative diseases using possibility approach and gait dynamics
Published 2025-07-01“…The proposed framework achieved a high coefficient of determination (R2 ≈ 0.90) and low error rates with stratified 10-fold cross-validation. …”
Get full text
Article -
1988
Unveiling construction accident causation: a scientometric analysis and qualitative review of research trends
Published 2025-04-01“…In addition, a qualitative synthesis was conducted to review common data sources and examine key issues, including risk factor identification, accident type classification, causality analysis, and the optimization of research strategies. …”
Get full text
Article -
1989
COMPARATIVE ANALYSIS OF MILLING-BAKERY AND CONFECTIONERY INDUSTRY IN SERBIA BASED ON BENFORD’S LAW
Published 2025-03-01“…Based on the conducted data analysis and the obtained results, the authors ranked the companies, after which, through a comparative analysis between these two branches, they showed which data in the Cash Flow Report have greater deviations from Benford’s analysis. …”
Get full text
Article -
1990
Natural Frequency Analysis of Permanent Magnet Eddy Current Couplings Based on the Riccati Transfer Matrix Method
Published 2024-06-01“…The results show that this method can accurately analyze the natural frequency of permanent magnet eddy current couplings, and the error generated by high-precision simulation model analysis is not more than 8%. …”
Get full text
Article -
1991
Variogram modelling optimisation using genetic algorithm and machine learning linear regression: application for Sequential Gaussian Simulations mapping
Published 2025-06-01“…The objective of this study is to develop an advanced approach to variogram modelling by integrating genetic algorithms (GA) with machine learning-based linear regression, aiming to improve the accuracy and efficiency of geostatistical analysis, particularly in mineral exploration. The study combines GA and machine learning to optimise variogram parameters, including range, sill, and nugget, by minimising the root mean square error (RMSE) and maximising the coefficient of determination (R2). …”
Get full text
Article -
1992
Intelligent Identification of Structural Damage Based on the Curvature Mode and Wavelet Analysis Theory
Published 2021-01-01“…During the process of monitoring, a large amount of data is generated. The selection of the appropriate methodology for the analysis of these data constitutes a major problem for maintenance personnel. …”
Get full text
Article -
1993
The accuracy of determining the coordinates of an unmanned aerial vehicle with a navigation complex integrating an electro-optical positioning system
Published 2023-03-01“…The article proposes the approaches to updating a strapdown inertial navigation system (SINS) based on data of the airborne electro-optical system (EOS) of an unmanned aerial vehicle (UAV). …”
Get full text
Article -
1994
An Analysis of the Driving Behaviours of Professional Truck Drivers: A Pilot Study in Turkey
Published 2022-12-01Get full text
Article -
1995
The Effects of Spatial Resolution Variability of Digital Elevation Models on Flood Hazard Analysis
Published 2023-06-01“…The FABDEM data is more advantageous in regional studies than others, whereas the LiDAR data can be used in basin-scaled studies. …”
Get full text
Article -
1996
Analysis of Learning Obstacles for Junior High School Students in Understanding SPLDV Concepts
Published 2024-01-01“…The research instruments used were concept understanding tests and interview guidelines. Data analysis in this research includes data reduction, data presentation, and concluding. …”
Get full text
Article -
1997
Impact Analysis of Energy Policy: Fuel Oil Subsidies and Global Warming Costs
Published 2024-12-01“…The analysis employed fuel oil subsidy and global warming cost data, along with relevant economic factors. …”
Get full text
Article -
1998
Systemic and local associated disorders in children with congenital cataracts-a retrospective analysis
Published 2025-03-01Get full text
Article -
1999
-
2000