-
2441
Cooperative Control Approach for Library Group Therapy with Constraint Conditions
Published 2025-04-01Get full text
Article -
2442
Mars Robot Puzzle (a Multiagent Approach to the Dijkstra Problem)
Published 2011-06-01“…All our algorithms are multiagent in contrast to "centralized" graph and combinatorial algoritms; correctness of our algorithms is formally proven, while the testing is used for validation of path-planning algorithms.…”
Get full text
Article -
2443
Lightweight malicious domain name detection model based on separable convolution
Published 2020-12-01“…The application of artificial intelligence in the detection of malicious domain names needs to consider both accuracy and calculation speed,which can make it closer to the actual application.Based on the above considerations,a lightweight malicious domain name detection model based on separable convolution was proposed.The model uses a separable convolution structure.It first applies depthwise convolution on every input channel,and then performs pointwise convolution on all output channels.This can effectively reduce the parameters of convolution process without impacting the effectiveness of convolution feature extraction,and realize faster convolution process while keeping high accuracy.To improve the detection accuracy considering the imbalance of the number and difficulty of positive and negative samples,a focal loss function was introduced in the training process of the model.The proposed algorithm was compared with three typical deep-learning-based detection models on a public data set.Experimental results denote that the proposed algorithm achieves detection accuracy close to the state-of-the-art model,and can significantly improve model inference speed on CPU.…”
Get full text
Article -
2444
Hybrid Technique Used for Straight Line Detection
Published 2011-07-01“…These techniques are:1-Hough Transform(HT), Develpoed Baron’s Method (DBM)and-Genetic Developed Baron’s Method(GDBM) First technique was applied as it, while the second technique was applied after performing some modification in its algorithm. …”
Get full text
Article -
2445
A computation offloading scheme for energy consumption optimization in Internet of vehicles
Published 2023-10-01“…In Internet of vehicles (IoV), vehicle-oriented applications are generally computation-intensive and latency-sensitive.Introducing idle computing resources from mobile vehicles as a supplement to network computing power can effectively alleviate the load pressure on edge servers.The problem of task allocation for edge computation offloading in the context of IoV environment were researched.By fully leveraging the combined computing resources of roadside units (RSU), user vehicles, and mobile vehicles within the RSU service range, a computation offloading strategy based on the sparrow search algorithm was proposed and referred to as sparrow search based computation offloading scheme (S<sup>2</sup>COS), aiming to optimize the overall system energy consumption.In addition, this strategy fully taked into account practical network issues such as service time constraints caused by vehicle mobility and the potential occurrence of computation node failures.The simulation results demonstrate that S<sup>2</sup>COS can meet the latency requirements for computation-intensive and latency-sensitive tasks, while significantly reducing system energy consumption.…”
Get full text
Article -
2446
WFQ ENHANCEMENT USING INTELLIGENT DISTRIBUTED QUEUE BASED ANFIS FOR PACKET SWITCHING NETWORK
Published 2019-06-01“…The diversity of Internet traffic requires some prioritization and prioritization because some visits deserve great attention while reducing delays and packet losses compared to others. …”
Get full text
Article -
2447
A Study of Ethical Implications of AI Tools Enhancing User Conveniences in the Indian Digital Landscape
Published 2024-09-01“…This paper examines how the intelligent algorithms affect personal freedoms of weaker sections, particularly the right to choice, and whether they reinforce existing social biases within Indian society. …”
Get full text
Article -
2448
An Energy-Saving Evaluation Method for Driving Behavior Based on the SHAP Scorecard Model
Published 2025-02-01Get full text
Article -
2449
Optimization of Production Scheduling for the Additive Manufacturing of Ship Models Using a Hybrid Method
Published 2024-11-01“…This paper introduces a hybrid optimization method that leverages either linear programming (LP) or a genetic algorithm (GA) based on the problem size to enhance the parallel additive manufacturing (AM) process for ship models. …”
Get full text
Article -
2450
Finding Key Nodes in Complex Networks Through Quantum Deep Reinforcement Learning
Published 2025-04-01“…We compared the proposed algorithm with some classical node ranking and network dismantling algorithms on various synthetical and empirical networks. …”
Get full text
Article -
2451
Providing QoS and Resiliency for Video Streaming Over MPTCP
Published 2025-01-01“…Additionally, we assess the resiliency of the proposed algorithm in scenarios involving subflow failures within the MPTCP connection. …”
Get full text
Article -
2452
Remaining useful life prediction of a small sample of aero-engine based on an improved gray Markov model
Published 2025-06-01“…To enhance adaptability, a genetic algorithm dynamically optimizes the time response parameters of the grey model, overcoming the limitation of a fixed structure in traditional methods. …”
Get full text
Article -
2453
Generative design recommendations for the historical Mardiṅ High School and Gaziṗaşa Primary School buildings, Turkey
Published 2025-07-01“…The genetic algorithm (GA) is inspired by natural selection, emphasizing the survival of the fittest. …”
Get full text
Article -
2454
Brain age prediction from MRI images based on a convolutional neural network with MRMR feature selection layer
Published 2025-05-01“…The feature selection layer uses MRMR algorithm which identifies essential characteristics for a target variable while minimizing feature redundancy to select the optimal feature subset. …”
Get full text
Article -
2455
-
2456
Mapping Kuwait bathymetry using passive multispectral remote sensing
Published 2021-08-01“…Some are commercial, such as IKONAS and WorldView, while others are freely available, such as Landsat 8 and sentainel-2. …”
Get full text
Article -
2457
Low pressure PEM electrolyzer system modeling with heat loss representation
Published 2025-09-01“…A recursive identification algorithm method is utilized to estimate the additional resistance associated with heat loss. …”
Get full text
Article -
2458
A dimension reduction assisted credit scoring method for big data with categorical features
Published 2025-01-01“…The evidence suggests that even small improvements in the accuracy of existing credit-scoring models may optimize profits while effectively managing risk exposure. Despite continuing efforts, the majority of existing credit scoring models still include some judgment-based assumptions that are sometimes supported by the significant findings of previous studies but are not validated using the institution’s internal data. …”
Get full text
Article -
2459
A Novel Dangerous Goods Detection Network Based on Multi-Layer Attention Mechanism in X-Ray Baggage Images
Published 2025-01-01Get full text
Article -
2460
Optimized SPR-PCF sensor for sucrose detection inspired by vertical pupil geometry
Published 2025-08-01“…The primary objective is achieving superior amplitude sensitivity (AS) while minimizing losses. To ensure this, we have applied the Nelder-Mead algorithm for precise optimization of the structural parameters. …”
Get full text
Article