-
10501
Joint Optimization of UAV Placement and Resource Allocation in FDMA Wireless-Powered Sensor Networks
Published 2025-01-01“…These algorithms offer significant advantages in execution time. …”
Get full text
Article -
10502
The Role of Time in Facial Dynamics and Challenges in Automatic Emotion Recognition (2019–2024)
Published 2025-01-01“…The study provides valuable insights for selecting appropriate algorithms that are tailored to specific research objectives and contexts.…”
Get full text
Article -
10503
Emergent behaviors in multiagent pursuit evasion games within a bounded 2D grid world
Published 2025-08-01“…After training with MARL algorithms, pursuers achieved a 99.9% success rate in 1,000 randomized pursuit-evasion trials, demonstrating the effectiveness of the learned strategies. …”
Get full text
Article -
10504
Efficient topology control for time-varying spacecraft networks with unreliable links
Published 2019-09-01“…Then, we provide five heuristic algorithms, which can significantly maintain low topology cost efficiency ratio while achieving high reliable connectivity. …”
Get full text
Article -
10505
Fairness in focus: quantitative insights into bias within machine learning risk evaluations and established credit models
Published 2025-05-01“…Abstract As the adoption of machine learning algorithms expands across industries, the focus on how these tools can perpetuate existing biases have gained attention. …”
Get full text
Article -
10506
Speech Emotion Recognition under White Noise
Published 2013-12-01“…Two speech enhancement algorithms are introduced for improved emotion classification. …”
Get full text
Article -
10507
A Comprehensive Survey on AI in Counter-Terrorism and Cybersecurity: Challenges and Ethical Dimensions
Published 2025-01-01“…However, critical concerns such as algorithmic bias, data quality limitations, and governance challenges introduce significant obstacles to their deployment. …”
Get full text
Article -
10508
StopSpamX: A multi modal fusion approach for spam detection in social networking
Published 2025-06-01“…The main difficulty arises while we deal with the spam data. So, this problem of spam data should be properly handled. …”
Get full text
Article -
10509
Application of machine learning to stress corrosion cracking risk assessment
Published 2022-12-01“…The fundamentals of machine learning algorithms and stress corrosion cracking were presented. …”
Get full text
Article -
10510
Deep reinforcement learning for inverse inorganic materials design
Published 2024-12-01“…Our models successfully learn chemical guidelines such as negative formation energy, charge neutrality, and electronegativity balance while maintaining high chemical diversity and uniqueness. …”
Get full text
Article -
10511
Accuracy measurement of automatic remeshing tools
Published 2024-07-01“…<p>Surface Reconstruction from raw Pointclouds generates polygonal meshes characterised by typical local issues that need to be addressed by a global reorganisation of mesh connectivity during the Remeshing process. While in the applications for which remeshing algorithms have historically been developed, the problem can be addressed without affecting the mesh polycount, for the authoring of 3D assets intended for Real-Time Rendering applications, maintaining a low polycount is mandatory. …”
Get full text
Article -
10512
GREEN ECONOMY AND HOLISTIC PLANNING BY ARTIFICIAL INTELLIGENCEAPPLICATION
Published 2024-10-01“…On the one hand, IT such as machine learning, data analytics, and optimization algorithms offer immense potential to enhance resource efficiency, optimize energy systems, and facilitate sustainable decision-making processes. …”
Get full text
Article -
10513
The Role of Artificial Intelligence in Criminal Investigations in India
Published 2025-06-01“…Predictive policing algorithms can be used to predict crime hotspots, while facial recognition systems can help identify suspects in a matter of minutes rather than hours and days taken in the manual methods. …”
Get full text
Article -
10514
REGIONS GROUPING IN CENTRAL SULAWESI PROVINCE BY TRANSMITTED DISEASE USING FUZZY GUSTAFSON KESSEL
Published 2023-04-01“…Data with similar characteristics will be gathered in one group. One of the algorithms in cluster analysis is Fuzzy Gustafson Kessel which can produce relatively better groupings compared to the basic algorithms in cluster analysis. …”
Get full text
Article -
10515
Design of Gain-Scheduled Lateral Controllers for Autonomous Vehicles
Published 2024-11-01“…The results show that while traditional controllers, such as Pure Pursuit, perform adequately under constant speed conditions, adaptive model-based algorithms significantly enhance the performance, especially in dynamic driving situations involving speed variations.…”
Get full text
Article -
10516
Prediction on rock strength by mineral composition from machine learning of ECS logs
Published 2025-06-01“…This study proposes the use of Random Forest and Transformer algorithms to predict rock strength from Elemental Capture Spectroscopy (ECS) logs. …”
Get full text
Article -
10517
VERITAS: Harnessing the power of nomenclature in biologic discovery
Published 2023-12-01“…VERITAS names are easy to understand while drawing direct connections to the structure of a given format, with or without specific target information, making these names useful to adopt in scientific discourse and as inputs to machine learning algorithms for drug development.…”
Get full text
Article -
10518
Research on cryptographic technology of future network information system
Published 2022-02-01“…In the future, network information systems will also face new threats and attack risks while introducing emerging technologies. This paper focuses on the characteristics of future network information system multi-domain integration, ubiquitous perception, intelligence, service customization and endogenous security, conducts security and confidentiality demand analysis and security threat and risk analysis, and designs a technology including cryptographic software and hardware platform technology, cryptography algorithms and protocols, cryptographic applications and security goals, hierarchical cryptographic architecture oriented to the future network information system.…”
Get full text
Article -
10519
Machine learning approaches for predicting the link of the global trade network of liquefied natural gas.
Published 2025-01-01“…This study demonstrates that machine learning algorithms-specifically random forest and decision tree-outperform in predicting links within the global LNG trade network based on local information proximity, while the graph attention network, a deep learning model, exhibits stable optimization and effective feature learning. …”
Get full text
Article -
10520
The optimization path of agricultural industry structure and intelligent transformation by deep learning
Published 2024-11-01“…The results demonstrate that the proposed method outperforms conventional algorithms in regression tasks, particularly in terms of computational efficiency, data processing speed, and model training stability, while also exhibiting high scalability. …”
Get full text
Article