-
2561
Integrated Thermal Management Strategy Using High-Value Prioritized Experience Replay Deep Reinforcement Learning for Battery Electric Vehicles
Published 2025-01-01“…In low-temperature environments, electric vehicles rely on effective thermal management strategies (TMS) to rapidly heat the battery to its optimal operating temperature while maintaining cabin temperature within a comfortable range. …”
Get full text
Article -
2562
An edge awareness-enhanced visual SLAM method for underground coal mines
Published 2025-03-01“…Specifically, line features were extracted using the EDLines algorithm, while point features were extracted using the Oriented FAST and Rotated BRIEF (ORB) algorithms. …”
Get full text
Article -
2563
AI-powered topic modeling: comparing LDA and BERTopic in analyzing opioid-related cardiovascular risks in women
Published 2025-02-01“…In addition, BERTopic has the connection port for ChatGPT-4-Turbo or other large language models in its algorithm for automatic interpretation, while with LDA interpretation must be manually, and needs special procedures for data pre-processing and stop words exclusion. …”
Get full text
Article -
2564
GPU Accelerated Trilateral Filter for MR Image Restoration
Published 2025-01-01“…The approach uses forward selection to identify 98 texture attributes while refining the selection process to find optimal regularity features. …”
Get full text
Article -
2565
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
2566
Overhead line path planning based on deep reinforcement learning and geographical information system
Published 2025-04-01“…Experimental verification of real data shows that compared with existing algorithms, the DSOP method is not only more consistent with the manual line selection effect (improved by more than 3%), but also has a high success rate. …”
Get full text
Article -
2567
Artificial intelligence tools for engagement prediction in neuromotor disorder patients during rehabilitation
Published 2024-12-01“…Additionally, feature reduction did not yield any advantages, while data augmentation consistently enhanced classifiers performance. …”
Get full text
Article -
2568
Differentiable architecture search-based automatic modulation recognition for multi-carrier signals
Published 2024-09-01“…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
Get full text
Article -
2569
Surrogate modeling of passive microwave circuits using recurrent neural networks and domain confinement
Published 2025-04-01“…The proposed procedure ensures building models of outstanding predictive power while using small training datasets, which is beyond the capabilities of benchmark algorithms.…”
Get full text
Article -
2570
Implementing Remote Radiotherapy Planning to Increase Patient Flow at a Johannesburg Academic Hospital, South Africa: Protocol for a Prospective Feasibility Study
Published 2025-07-01“…Phase 1 (feasibility) encompasses system commissioning, including beam modeling, computed tomography (CT)-to-electron density calibration, multileaf collimator (MLC) optimization, and dose calculations using the anisotropic analytical algorithm. …”
Get full text
Article -
2571
Laser-induced Breakdown Spectroscopy Based on Pre-classification Strategy for Quantitative Analysis of Rock Samples
Published 2023-08-01“…Different element quantitative models were constructed for each rock type. The kNN algorithm was selected using cross-validation to determine the optimal k value, and the key punishment parameter C and RBF width parameter γ of the SVM algorithm were determined using a grid search method. …”
Get full text
Article -
2572
Analysis of Blockchain-Technology
Published 2025-06-01“…While Layer 1 and Layer 2 solutions provide significant improvements in throughput and efficiency, their integration remains a key challenge. …”
Get full text
Article -
2573
A seismic random noise suppression method based on CNN-Mamba
Published 2025-05-01“…The hardware-aware parallel algorithm of Mamba was employed to reduce the computational resource consumption, thus ensuring the denoising performance while enhancing computational efficiency. …”
Get full text
Article -
2574
Experimental Study on Evaluation of Organization Collaboration in Prefabricated Building Construction
Published 2025-02-01“…The knowledge-driven part of this evaluation system used an evaluation model based on the analytic hierarchy process (AHP), while the data-driven part used a prediction model based on the BO-XGBoost algorithm to verify the validity of the AHP-based model. …”
Get full text
Article -
2575
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01“…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
Get full text
Article -
2576
Multi task detection method for operating status of belt conveyor based on DR-YOLOM
Published 2025-06-01“…Secondly, as the model requires target recognition and segmentation of different types of tasks, an efficient layer aggregation network (RepGFPN) with skip layer connection structure is adopted to optimize the feature fusion part, greatly improving the detection accuracy of the model for different detection tasks while controlling the number of model parameters and inference speed; Finally, to address the detection tasks of three different label shapes, the Inner CIOU loss function is introduced to compensate for the weak generalization ability of the CIoU loss function in different detection tasks. …”
Get full text
Article -
2577
Artificial Intelligence-Based Techniques for Fouling Resistance Estimation of Shell and Tube Heat Exchanger: Cascaded Forward and Recurrent Models
Published 2025-04-01“…The training process is optimized using the Levenberg–Marquardt (LM) algorithm, ensuring rapid convergence and high accuracy. …”
Get full text
Article -
2578
Predicting weather-related power outages in large scale distribution grids with deep learning ensembles
Published 2025-09-01“…This paper focuses on predicting daily reported incidences in electrical grids within specific regions, leveraging weather conditions as specific predictive variables. An optimization-based feature selection approach has been considered for selecting the optimal Reanalysis node locations used as predictors. …”
Get full text
Article -
2579
Enhancing phase change thermal energy storage material properties prediction with digital technologies
Published 2025-07-01“…IntroductionIn the field of materials science, the prediction of material properties plays a critical role in designing new materials and optimizing existing ones. Traditional experimental approaches, while effective, are resource-intensive and time-consuming, often requiring extensive trial-and-error methods. …”
Get full text
Article -
2580
Machine learning enables legal risk assessment in internet healthcare using HIPAA data
Published 2025-08-01“…DNN demonstrates strong capabilities in handling complex nonlinear relationships, and XGBoost further improves classification accuracy by optimizing decision tree models through gradient boosting. …”
Get full text
Article