-
4141
A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange
Published 2025-03-01“…This approach enhances security during data transmission and storage while mitigating the common vulnerabilities found in single-algorithm solutions. …”
Get full text
Article -
4142
Energy-Efficient UAV Relaying Robust Resource Allocation in Uncertain Adversarial Networks
Published 2021-01-01“…We derive EE UAV relay-user maximization problem in the adversarial wireless networks at last. While the problem is non-convex, we propose an iterative and sub-optimal algorithm to optimize EE UAV relay with constraints, such as ICC, trajectory, speed, acceleration, and transmit power. …”
Get full text
Article -
4143
Effects of PET image reconstruction parameters and tumor-to-background uptake ratio on quantification of PET images from PET/MRI and PET/CT systems
Published 2024-09-01“…The Bayesian penalized likelihood (BPL) algorithm, recently introduced, uses a noise penalty factor (β) to achieve full convergence while controlling noise. …”
Get full text
Article -
4144
A high performance approach to ensure image security during transmission
Published 2025-09-01“…The randomization is achieved through a Mersenne Twister algorithm. This project uses parallelization techniques to optimize computational performance and reduce the runtime. …”
Get full text
Article -
4145
Enhancing grid-connected PV-EV charging station performance through a real-time dynamic power management using model predictive control
Published 2024-12-01“…Furthermore, these systems often require multiple power electronics converters, increasing complexity and costs while reducing overall system efficiency. To overcome these limitations, the proposed algorithm dynamically switches between on-grid and off-grid modes based on real-time weather conditions, grid availability, and the state of charge of the battery electric vehicle (BEV). …”
Get full text
Article -
4146
Artificial intelligence in educational technology and transformative approaches to English language using fuzzy framework with CRITIC-TOPSIS method
Published 2025-07-01“…Abstract Artificial intelligence (AI) is transforming educational technology by enabling personalized, adaptive, and data-driven learning experiences. Machine learning algorithms analyze student performance to tailor content delivery, while natural language processing facilitates interactive learning through voice assistants and essay evaluation. …”
Get full text
Article -
4147
Smart extrusion via data-driven prediction of grain size and peripheral coarse grain defect formation
Published 2025-03-01“…Abstract Optimization of the mechanical and crash properties of extruded AA6XXX automotive profiles requires detailed understanding of grain size evolution and formation of the peripheral coarse grain (PCG) defect. …”
Get full text
Article -
4148
Three-dimensional reconstruction and structural surface identification of high steep slopes based on UAV close-range photogrammetry
Published 2025-02-01“…An adaptive KNN algorithm is introduced to enhance the coplanarity detection passing rate in point clouds, while optimal planar equations are fitted using the least squares method. …”
Get full text
Article -
4149
Real-Time Series Arc Fault Detection and Appliances Classification in AC Networks Based on Competing Convolutional Kernels
Published 2025-01-01“…To reduce inference time and optimize the algorithm for embedded control units, a feature reduction strategy is employed. …”
Get full text
Article -
4150
PCMINN: A GPU-Accelerated Conditional Mutual Information-Based Feature Selection Method
Published 2025-05-01“…Conditional Mutual Information Nearest-Neighbor (CMINN) is an algorithm developed to address this challenge by using Conditional Mutual Information (CMI) to assess the relevance of individual features to the target variable, while identifying redundancy among similar features. …”
Get full text
Article -
4151
Efficient tuna detection and counting with improved YOLOv8 and ByteTrack in pelagic fisheries
Published 2025-07-01“…This paper proposes an automatic tuna counting method based on the YOLOv8n-DMTNet target detection algorithm combined with the improved ByteTrack tracking algorithm. …”
Get full text
Article -
4152
Temporal Community Detection and Analysis with Network Embeddings
Published 2025-02-01“…To address these issues, we propose TCDA-NE, a novel TCD algorithm that combines evolutionary clustering with convex non-negative matrix factorization (Convex-NMF). …”
Get full text
Article -
4153
Enhancing Automated Maneuvering Decisions in UCAV Air Combat Games Using Homotopy-Based Reinforcement Learning
Published 2024-12-01“…While algorithms enhanced with densely distributed artificial rewards show potential, they risk deviating from the primary objectives. …”
Get full text
Article -
4154
Adaptive Fast Refocusing for Ship Targets With Complex Motion in SAR Images
Published 2025-01-01“…This algorithm can adaptively adjust algorithm parameters based on SAR images from different SAR platforms, thereby more accurately determining the optimal rotation interval (ORI), reducing computational cost, and achieving adaptive fast refocusing. …”
Get full text
Article -
4155
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids.
Published 2025-01-01“…Future research should focus on integrating real-world smart grid data for validation, developing adaptive learning mechanisms, exploring other bio-inspired optimization algorithms, and addressing real-time processing and scalability challenges in large-scale deployments.…”
Get full text
Article -
4156
PP-QADMM: A Dual-Driven Perturbation and Quantized ADMM for Privacy Preserving and Communication-Efficient Federated Learning
Published 2025-01-01“…We provide a rigorous theoretical proof of convergence, showing that PP-QADMM converges to the optimal solution for convex problems while achieving a convergence rate comparable to standard ADMM, but with significantly lower communication and energy costs, and robust privacy protection. …”
Get full text
Article -
4157
TA-RRT*: Adaptive Sampling-Based Path Planning Using Terrain Analysis
Published 2025-02-01“…While existing RRT*-based algorithms perform node sampling and tree expansion in various ways to optimize path planning, they may still generate inefficient paths in complex terrain environments. …”
Get full text
Article -
4158
RFID-Based Real-Time Salt Concentration Monitoring with Adaptive EKF
Published 2025-06-01“…The concentration dynamics are modeled as a hidden Markov process and tracked using an adaptive extended Kalman filter (AEKF). The AEKF algorithm avoids computationally expensive inversion of complex observation equations while automatically adjusting noise covariance matrices via innovation sequence. …”
Get full text
Article -
4159
Graph attention networks based multi-agent path finding via temporal-spatial information aggregation.
Published 2025-01-01“…An effective Multi-Agent Path Finding (MAPF) algorithm must efficiently plan paths for multiple agents while adhering to constraints, ensuring safe navigation from start to goal. …”
Get full text
Article -
4160
Short-term results of treatment of non-epithelial gastro-intestinal tumors complicated by bleeding
Published 2011-09-01“…According to suggested diagnostic algorithm detailed characteristic of patients with bleeding tumor was given, the optimal method of surgical intervention was chosen. …”
Get full text
Article