-
6121
Application of Mordell–Weil lattices with large kissing numbers to acceleration of multiscalar multiplication on elliptic curves
Published 2025-04-01“…As usual, the resulting curve points can be then regularly used in the main stage of an MSM algorithm to avoid repeating computations. Seemingly, this is the first usage of lattices with large kissing numbers in cryptography, while such lattices have already found numerous applications in other mathematical domains. …”
Get full text
Article -
6122
Remote Sensing Image Enhancement Via Edge-Preserving Multiscale Retinex
Published 2019-01-01“…In this paper, we propose a novel algorithm to enhance the contrast of remote sensing image while avoiding color distortion and detail loss. …”
Get full text
Article -
6123
Impact of dimensionality reduction techniques on student performance prediction using machine learning
Published 2023-10-01“…The results show that ADRA achieves an average dimensionality reduction factor of 6.2 while maintaing comprable accuracy with other mehtods. …”
Get full text
Article -
6124
Procedure for Separate Accounting of Interest and Exchange Rate Components of the Fair Value of a Set of Financial Instruments: IFRS
Published 2022-11-01“…In particular, it has worked out an algorithm for accounting and mathematical evaluation of exchange rate differences when hedging cash flows of debt instruments with currency forwards. …”
Get full text
Article -
6125
Hierarchical predictive optimal control for range extension of EV with ANN based torque control for IPMSM drives
Published 2024-12-01“…This study presents a novel methodology to enhance the energy efficiency of Electric Vehicles (EVs) while maintaining dynamic stability and driving comfort, even on uneven roads, using onboard vehicle measurements. …”
Get full text
Article -
6126
Improving data sharing and knowledge transfer via the Neuroelectrophysiology Analysis Ontology (NEAO)
Published 2025-05-01“…On the other hand, different software codes can implement the same analysis algorithm, while adopting different names to identify functions and parameters. …”
Get full text
Article -
6127
Dynamic emotion intensity estimation from physiological signals facilitating interpretation via appraisal theory.
Published 2025-01-01“…In our experiment, emotions of varying intensities are induced for three distinct qualities while physiological signals are measured, and participants assess their subjective feeling in real time. …”
Get full text
Article -
6128
Convergence Analysis for Differentially Private Federated Averaging in Heterogeneous Settings
Published 2025-02-01“…Federated learning (FL) has emerged as a prominent approach for distributed machine learning, enabling collaborative model training while preserving data privacy. However, the presence of non-i.i.d. data and the need for robust privacy protection introduce significant challenges in theoretically analyzing the performance of FL algorithms. …”
Get full text
Article -
6129
Bidding strategies for virtual power plants under the electricity-carbon joint market taking into account wind and solar uncertainties
Published 2025-05-01“…The upper level maximizes the VPP's profit, while the lower level maximizes social welfare in the joint market. …”
Get full text
Article -
6130
Sensor placement optimization for critical-grid coverage problem of indoor positioning
Published 2020-12-01“…As a conclusion, the proposed method could reduce the cost of sensor deployment while ensuring the accuracy of indoor positioning for critical areas. …”
Get full text
Article -
6131
Anomaly Detection Approach Based on Deep Neural Network and Dropout
Published 2020-06-01“…However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. …”
Get full text
Article -
6132
Distributed Event-Triggered-Based Adaptive Formation Tracking Control for Multi-UAV Systems Under Fixed and Switched Topologies
Published 2025-03-01“…Finally, the validity of the designed algorithm is confirmed by numerical examples and software-in-the-loop (SIL) simulation experiments.…”
Get full text
Article -
6133
Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders
Published 2024-04-01“…Experiments on public data sets and NS-3 simulation data sets show that while ensuring lightweight, the proposed model reduces the false negative rate by an average of 35.9% and 48% compared with the baseline method.…”
Get full text
Article -
6134
Hybrid modeling for optimizing electrospun polyurethane nanofibrous membranes in air filtration applications
Published 2025-07-01“…However, optimizing their structural characteristics to maximize filtration efficiency while minimizing pressure drop remains challenging due to the complexity of the electrospinning process. …”
Get full text
Article -
6135
Accurate Solar Radiation Forecasting Through Feature-Enhanced Decision Trees and Wavelet Decomposition
Published 2025-01-01“…This study explores the efficacy of the decision tree algorithm in predicting solar power generation, addressing the inherent variability in photovoltaic (PV) energy production due to weather conditions. …”
Get full text
Article -
6136
Comparing the Effect of Age, Gender, and Desired Speed on Car-Following Behavior by Using Driving Simulator
Published 2021-01-01“…The CF model for each driver was calibrated by genetic algorithm. Gender and DS were effective in CF behavior, while the age factor was not. …”
Get full text
Article -
6137
Automatic speech analysis combined with machine learning reliably predicts the motor state in people with Parkinson’s disease
Published 2025-05-01“…Acoustic speech features were automatically extracted with the algorithm given by the Dysarthria Analyzer. Results suggest that acute levodopa intake improves phonatory-respiratory speech functions and speech planning abilities, while the articulatory system remains unaffected. …”
Get full text
Article -
6138
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
6139
Authentication of an Indonesian ID Card with Simultaneous NFC and Face Recognition
Published 2025-06-01“…The application, developed using Flutter, incorporates facial recognition for biometric verification, while NFC is employed as an additional authentication layer to provide dual-factor verification and reinforce identity security. …”
Get full text
Article -
6140
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“…The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms. …”
Get full text
Article