-
5101
Research Progress on Selective Depolymerization of Waste Plastics to High-Quality Liquid Fuels
Published 2025-06-01“…Catalytic pyrolysis faces the challenge of rapid catalyst deactivation (resulting in a 30% activity loss after 5 cycles), while microwave systems incur high capital costs. …”
Get full text
Article -
5102
Essay Answer Detection System Uses Cosine Similarity and Similarity Scoring in Sentences
Published 2024-12-01“…To improve accuracy and usability, future developments could use sophisticated text scoring algorithms and provide more features. This study highlights the importance of automated grading systems for optimizing essay scoring in educational settings while maintaining scalability and reliability. …”
Get full text
Article -
5103
The State Preparation of Multivariate Normal Distributions using Tree Tensor Network
Published 2025-05-01“…The numerical results suggest that our method can dramatically reduce the circuit depth and CNOT count while maintaining fidelity compared to existing approaches.…”
Get full text
Article -
5104
Research on Functional Modularity and Health Monitoring Design of Home Fitness Equipment
Published 2025-05-01“…This study proposes an innovative integrated design framework for multifunctional home fitness equipment, combining modular design, space optimization, and intelligent health monitoring. The design integrates an exercise bike, rowing machine, and spring tensioner into a single unit, reducing equipment footprint by 30% while enabling seamless transitions between exercise modes. …”
Get full text
Article -
5105
A Review of Environmental Control Strategies and Models for Modern Agricultural Greenhouses
Published 2025-02-01“…Greenhouse control involves regulating environmental parameters such as temperature, humidity, light, and CO<sub>2</sub> concentration to ensure an optimal growth environment for crops while conserving energy. …”
Get full text
Article -
5106
A Comprehensive Survey on AI in Counter-Terrorism and Cybersecurity: Challenges and Ethical Dimensions
Published 2025-01-01“…This paper provides a comprehensive overview of AI methodologies, such as predictive analytics, Natural Language Processing (NLP), and machine learning architectures (e.g., Support Vector Machines – SVM and Long Short-Term Memory – LSTM), and optimization algorithms (e.g., Particle Swarm Optimization – PSO), assessing their effectiveness in security applications. …”
Get full text
Article -
5107
Leveraging Spectral Neighborhood Information for Corn Yield Prediction with Spatial-Lagged Machine Learning Modeling: Can Neighborhood Information Outperform Vegetation Indices?
Published 2025-03-01“…Accurate and reliable crop yield prediction is essential for optimizing agricultural management, resource allocation, and decision-making, while also supporting farmers and stakeholders in adapting to climate change and increasing global demand. …”
Get full text
Article -
5108
Research on the effectiveness of data compression methods in relational and NoSQL DBMS
Published 2024-04-01“…Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.…”
Get full text
Article -
5109
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
5110
Addressing grading bias in rock climbing: machine and deep learning approaches
Published 2025-01-01“…The primary three approaches were from a route-centric, climber-centric, or path finding and path generation context. Of these, the most optimal methods used natural language processing or recurrent neural network algorithms. …”
Get full text
Article -
5111
Review of the Research on Underwater Explosion Ice-Breaking Technology
Published 2025-07-01“…Key findings establish that shock waves initiate brittle fracture via stress superposition while bubble pulsation drives crack propagation through pressure oscillation; optimal ice fragmentation depends critically on charge weight, standoff distance, and ice thickness. …”
Get full text
Article -
5112
Exploring Machine Learning Models for Vault Safety in ICL Implantation: A Comparative Analysis of Regression and Classification Models
Published 2025-06-01“…Regression and classification models were developed using gradient boosting, random forest, and CatBoost algorithms. Regression models predicted vault height as a continuous variable, while classification models categorized vault heights into binary and multi-class tasks. …”
Get full text
Article -
5113
Revolutionizing pharmacology: AI-powered approaches in molecular modeling and ADMET prediction
Published 2025-12-01“…The fusion of Artificial intelligence (AI) with computational chemistry has revolutionized drug discovery by enhancing compound optimization, predictive analytics, and molecular modeling. …”
Get full text
Article -
5114
ON TRAVERSABILITY COST EVALUATION FROM PROPRIOCEPTIVE SENSING FOR A CRAWLING ROBOT
Published 2015-12-01“…This paper addresses the problem of traversability cost evaluation based on proprioceptive sensing for a hexapod walking robot while optimizing different criteria. We present several methods of evaluating the robot-terrain interaction that can be used as a cost function for an assessment of the robot motion that can be utilized in high-level path-planning algorithms.…”
Get full text
Article -
5115
Advanced parameter tuning scheme for double CFO based fractional order composite controller synthesis method
Published 2025-12-01“…This method sequentially employs D-decomposition and optimization algorithms to address these challenges. …”
Get full text
Article -
5116
Utilizing UAVs in Wireless Networks: Advantages, Challenges, Objectives, and Solution Methods
Published 2024-10-01“…Additionally, we discuss the main methods and algorithms employed for UAV placement and trajectory optimization. …”
Get full text
Article -
5117
Implementation of Machine Vision Methods for Cattle Detection and Activity Monitoring
Published 2025-03-01“…The goal of this research was to implement machine vision algorithms in a cattle stable to detect cattle in stalls and determine their activities. …”
Get full text
Article -
5118
Deep Clustering of Student Code Strategies Using Multi-View Code Representation (CMVAE)
Published 2025-03-01“…The model captures structural features by transforming code into tree graphs and extracting centrality measures, while CodeBERT provides semantic embeddings. Through a joint optimization of reconstruction loss and clustering loss, the model effectively integrates multiple code representations. …”
Get full text
Article -
5119
Integrated Waste Management in the Circular Economy Era: Insights from Research and Practice
Published 2025-02-01“…Technological advancements, such as AI-driven waste sorting and route optimization algorithms, are highlighted alongside policy frameworks supporting circular economy principles. …”
Get full text
Article -
5120
Revolutionizing Supply Chain Management With AI: A Path to Efficiency and Sustainability
Published 2024-01-01“…Through an in-depth analysis of various AI techniques—such as machine learning, predictive analytics, and optimization algorithms—this study offers novel insights into their applicability in solving complex supply chain problems like demand forecasting, inventory management, and logistics optimization. …”
Get full text
Article