-
561
Algorithms for Integrated Object Detection in Wireless Sensor Networks
Published 2025-05-01“…Wireless sensor networks can be used to solve various economic problems, including detection of objects (phenomena) of interest. Most of the well-known information processing algorithms in such networks are built according to a radial architecture. …”
Get full text
Article -
562
Using machine learning algorithms to predict colorectal polyps
Published 2025-02-01“…Background: Colorectal cancer (CRC) is the third most common cancer worldwide, and colorectal polyps (CRP) represent a necessary pathway to the development of CRC. …”
Get full text
Article -
563
Decision-making method for residual support force of hydraulic supports during pressurized moving under fragmented roof conditions in ultra-thin coal seams
Published 2025-03-01“…To address this challenge, this study proposed a novel decision-making method based on a Deep Hybrid Kernel Extreme Learning Machine (DHKELM) optimized by an Improved Dung Beetle Optimization (IDBO) algorithm. …”
Get full text
Article -
564
Dynamic parking space allocation at urban scale: Problem formulation and resolution
Published 2022-11-01Get full text
Article -
565
Optimal Design of Integrating Two‐Level Artificial Intelligent With Three Degrees of Freedom‐PDF (TLNF‐3DOFPDF) Controller for AGC of Three‐Area Multi‐Sources Power System...
Published 2025-04-01“…Controller parameters are fine‐tuned using a novel metaheuristic method called the Skill Optimization Algorithm (SOA). The research assesses controller performance using multiple indices Integral of Time‐weighted Squared Error (ITSE), Integral of Squared Error (ISE), Integral of Time‐weighted Absolute Error (ITAE), and Integral of Absolute Error (IAE) and finds that ISE yields the most optimal results. …”
Get full text
Article -
566
The Application of PSO in Structural Damage Detection: An Analysis of the Previously Released Publications (2005–2020)
Published 2022-09-01“…Among different algorithms, the particle swarm optimization (PSO) approach has been of the most popular ones. …”
Get full text
Article -
567
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01“…Optimization of pharmacotherapy by prescribing drugs with fixed combinations can improve control of drug administration. …”
Get full text
Article -
568
Application of Artificial Intelligence Computer Intelligent Heuristic Search Algorithm
Published 2022-01-01“…After 231 iterations of particle swarm optimization algorithm, the optimal value is 6.83650785e-001. …”
Get full text
Article -
569
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
570
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
571
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
572
A Global Path Planning Algorithm Based on Bidirectional SVGA
Published 2017-01-01“…This algorithm does not construct a visibility graph before the path optimization. …”
Get full text
Article -
573
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
574
Implications of algorithmic bias in AI-driven emergency response systems
Published 2026-01-01“…Unlike existing research, which mostly addresses technical or ethical aspects in isolation, our approach integrates economic theory with algorithmic fairness to quantify and systematically analyze how biases in data quality and algorithm design impact resource allocation efficiency, response time equity, healthcare outcomes, and social welfare. …”
Get full text
Article -
575
Research on SBMPC Algorithm for Path Planning of Rescue and Detection Robot
Published 2020-01-01“…This research aims to improve autonomous navigation of coal mine rescue and detection robot, eliminate the danger for rescuers, and enhance the security of rescue work. …”
Get full text
Article -
576
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…The results confirm the efficiency of the proposed feature selection method in improving Arabic Text Classification accuracy. Keywords: Arabic Natural Language Processing, Feature Selection, Firefly optimization method, Text Classification…”
Get full text
Article -
577
AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection
Published 2025-05-01“…Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. …”
Get full text
Article -
578
The Improved MNSPI Method for MODIS Surface Reflectance Data Small-Area Restoration
Published 2025-03-01Get full text
Article -
579
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
580
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
Article