-
201
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01Get full text
Article -
202
Short-Term Photovoltaic Power Forecasting Based on the VMD-IDBO-DHKELM Model
Published 2025-01-01“…A short-term photovoltaic power forecasting method is proposed, integrating variational mode decomposition (VMD), an improved dung beetle algorithm (IDBO), and a deep hybrid kernel extreme learning machine (DHKELM). …”
Get full text
Article -
203
-
204
Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer
Published 2025-07-01“…Results demonstrate that the CNN-LSTM-BMO achieves superior performance with the lowest Root Mean Square Error (RMSE) of 0.5523 and highest R² value of 0.9435, showing statistically significant improvements over other optimization methods as confirmed by paired t-tests (P < 0.05). …”
Get full text
Article -
205
Application of HHO-CNN-LSTM-based CMAQ correction model in air quality forecasting in Shanghai
Published 2023-12-01“…Accordingly, a correction model, which combines convolutional neural network (CNN) and long-short term memory neural network (LSTM) and optimized by harris hawks optimization algorithm (HHO) was established to enhance the accuracy of CMAQ model's prediction results for six air pollutants (SO_2, NO_2, PM_10, PM_2.5, O_3 and CO). …”
Get full text
Article -
206
-
207
Delphi consensus statement for the management of delayed post-polypectomy bleeding
Published 2025-04-01“…These recommendations aim to improve patient outcomes and optimize healthcare resources while fostering a standardized approach to this common adverse event.…”
Get full text
Article -
208
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
Get full text
Article -
209
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience
Published 2025-04-01“…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
Get full text
Article -
210
-
211
Decision-making method for residual support force of hydraulic supports during pressurized moving under fragmented roof conditions in ultra-thin coal seams
Published 2025-03-01“…To address this challenge, this study proposed a novel decision-making method based on a Deep Hybrid Kernel Extreme Learning Machine (DHKELM) optimized by an Improved Dung Beetle Optimization (IDBO) algorithm. …”
Get full text
Article -
212
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
213
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01Get full text
Article -
214
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
215
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
216
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
217
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
218
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
Article -
219
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
220
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01Get full text
Article