-
6181
Constructing a Computer Model of the Human Eye Based on Tissue Slice Images
Published 2010-01-01“…Slice images were obtained from an in vitro Chinese human eye through an embryo specimen processing methods. A level set algorithm was used to extract contour points of eye tissues while a principle component analysis was used to detect the central axis of the image. …”
Get full text
Article -
6182
DSGD++: Reducing Uncertainty and Training Time in the DSGD Classifier through a Mass Assignment Function Initialization Technique
Published 2025-08-01“…We present a method for the Dempster-Shafer Gradient Descent (DSGD) algorithm that significantly reduces training time—by a factor of 1.6—and also reduces the uncertainty of each rule (a condition on features leading to a class label) by a factor of 2.1, while preserving accuracy comparable to other statistical classification techniques. …”
Get full text
Article -
6183
Performance of the ALICE Zero Degree Calorimeters in LHC Run 3
Published 2025-01-01“…In order to fully exploit the potential offered by the LHC increased luminosity in Run 3, while preserving the time and charge resolution performance, the ZDC readout system was upgraded to allow the acquisition of all collisions in self-triggered mode without dead time. …”
Get full text
Article -
6184
Fluid Dynamics of Biomimetic Pectoral Fin Propulsion Using Immersed Boundary Method
Published 2016-01-01“…The prescribed fin kinematics in each period consists of the power stroke and the recovery stroke, and the simulations indicate that the former is mainly used to provide the thrust while the latter is mainly used to provide the lift. …”
Get full text
Article -
6185
A New Strategy to Modify Hopfield by Using XOR Operation
Published 2024-09-01“…In additional it learns to recognize an infinite number of patterns with varying sizes while preserving a suitable noise ratio. …”
Get full text
Article -
6186
Neuro-cognitive multilevel causal modeling: A framework that bridges the explanatory gap between neuronal activity and cognition.
Published 2024-12-01“…Multilevel causal modeling allows us to interchangeably reason about the neuronal- and cognitive causes of behavior while maintaining a physicalist (in contrast to a strong dualist) position. …”
Get full text
Article -
6187
Adaptive Learning Based Scheduling in Multichannel Protocol for Energy-Efficient Data-Gathering Wireless Sensor Networks
Published 2013-02-01“…In this paper, we propose a contention-free multichannel protocol to maximize network throughput while ensuring energy-efficient operation. Arguing that routing decisions influence to a large extent the network throughput, we formulate route selection and transmission scheduling as a joint problem and propose a Reinforcement Learning based scheduling algorithm to solve it in a distributed manner. …”
Get full text
Article -
6188
An Inter-Regional Lateral Transshipment Model to Massive Relief Supplies with Deprivation Costs
Published 2025-07-01“…Specifically, JADE is employed in the first stage to allocate the volume of massive relief supplies, aiming to minimize deprivation costs, while IALNS optimizes intermodal routing in the second stage to minimize the weighted sum of transportation time and cost. …”
Get full text
Article -
6189
Optimization Techniques on Quantum and Classical Systems: A Comprehensive Comparative Study
Published 2025-01-01“…This study compares Particle Swarm Optimization (PSO), Moth Flame Optimization (MFO), and Genetic Algorithm (GA) on three platforms : a local computer, a local computer with quantum integration, and an IBM quantum machine. …”
Get full text
Article -
6190
Source Quantization and Coding over Noisy Channel Analysis
Published 2024-11-01“…., the channel decoding algorithm is employed to realize the lossy source coding. …”
Get full text
Article -
6191
Prediction of the spatial distribution of vine weevil under climate change using multiple variable selection methods
Published 2025-03-01“…This research developed multiple species distribution models (SDMs) using different variable selection methods, including correlation, biological considerations, and principal component analysis, and integrated them into an ensemble model to predict the pest’s distribution under climate change. The MaxEnt algorithm was used to develop the models, showing robust performance with raw bioclimatic variables (TSS 0.34–0.37, F1 score 0.60–0.67), while lower performance and different distribution patterns were observed with reconstructed variables (TSS 0.13, F1 score 0.48). …”
Get full text
Article -
6192
Enhancing security and usability with context aware multi-biometric fusion for continuous user authentication
Published 2025-08-01“…Keystroke dynamics are processed using Wavelet Transform Filtering (WTF) to improve feature extraction, while gait data is refined with an Autocorrelation (AC) Filter to ensure the use of reliable gait segments. …”
Get full text
Article -
6193
Towards carbon emission modeling and optimization for time-sensitive IIoT
Published 2025-03-01“…Based on this, considering low-latency constraints, a task offloading optimization algorithm based on the alternative direction method of multipliers (ADMM) was designed to minimize the overall carbon emissions of the considered IIoT system. …”
Get full text
Article -
6194
Doppler broadening of neutron elastic scattering cross section using SCLM(α,β) thermal scattering laws
Published 2025-01-01“…Despite works performed on 238U, no algorithm reported in the literature provides a unified Crystal Lattice Model valid below and above the thermal cutoff energy. …”
Get full text
Article -
6195
The close-open mixed-fleet electric vehicle routing problem
Published 2023-12-01“…To solve large instances, three discrete optimization swarm intelligence algorithms are employed, alongside a Variable Neighborhood Search algorithm. …”
Get full text
Article -
6196
Contribution of Daylighting to Saving Electrical Energy in Cameroon: Case Study of a Classroom in a Public School
Published 2025-01-01“…Applying the optimization algorithm designed for this purpose brings the average illuminance level down to 300lx following the EN12464 standard. …”
Get full text
Article -
6197
Research on image generation technology based on deep learning
Published 2025-01-01“…Based on the above problems, this paper analyzes the methods of improving and optimizing the mainstream image generation algorithm from the perspectives of improving and optimizing the loss function, improving the space modeling, revising the structure of both the generator and discriminator, while speeding up the training process. …”
Get full text
Article -
6198
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
6199
Supervised Clustering of Persian Handwritten Images
Published 2024-11-01“…Analyzing high-dimensional data, however, presents challenges, notably the curse of dimensionality. While various methods have been developed to address the dimensionality reduction, most overlooked the role of dependent variables. …”
Get full text
Article -
6200
Improved Hadamard Decomposition and Its Application in Data Compression in New-Type Power Systems
Published 2025-02-01“…The experimental results with simulated and field data demonstrate that the proposed scheme significantly reduces data volume while maintaining critical features in the restored data. …”
Get full text
Article