-
201
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01Get full text
Article -
202
-
203
Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer
Published 2025-07-01“…Results demonstrate that the CNN-LSTM-BMO achieves superior performance with the lowest Root Mean Square Error (RMSE) of 0.5523 and highest R² value of 0.9435, showing statistically significant improvements over other optimization methods as confirmed by paired t-tests (P < 0.05). …”
Get full text
Article -
204
Application of HHO-CNN-LSTM-based CMAQ correction model in air quality forecasting in Shanghai
Published 2023-12-01“…Accordingly, a correction model, which combines convolutional neural network (CNN) and long-short term memory neural network (LSTM) and optimized by harris hawks optimization algorithm (HHO) was established to enhance the accuracy of CMAQ model's prediction results for six air pollutants (SO_2, NO_2, PM_10, PM_2.5, O_3 and CO). …”
Get full text
Article -
205
-
206
Delphi consensus statement for the management of delayed post-polypectomy bleeding
Published 2025-04-01“…These recommendations aim to improve patient outcomes and optimize healthcare resources while fostering a standardized approach to this common adverse event.…”
Get full text
Article -
207
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience
Published 2025-04-01“…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
Get full text
Article -
208
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
Get full text
Article -
209
-
210
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01Get full text
Article -
211
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
212
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
213
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
214
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
215
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
216
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01Get full text
Article -
217
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
218
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
Article -
219
Anomaly Detection and Root Cause Analysis for Energy Consumption of Medium and Heavy Plate: A Novel Method Based on Bayesian Neural Network with Adam Variational Inference
Published 2025-01-01“…Anomaly detection and root cause analysis of energy consumption not only optimize energy use and improve equipment reliability but also contribute to green and low-carbon development. …”
Get full text
Article -
220
The performance evaluation of chaotic maps in estimating the shape parameters of radial basis functions to solve partial differential equations
Published 2024-06-01“…Purpose: This study aims to investigate the potential of chaotic optimization algorithms in improving performance compared to other optimization methods, focusing on determining the appropriate shape parameter of radial basis functions for solving partial differential equations.Methodology: In this research, a two-stage process is employed where the Kansa method, based on meshless local techniques, is combined with the FCW method. …”
Get full text
Article