-
5001
Service Function Chain Migration: A Survey
Published 2025-05-01“…Traditional optimization algorithms often fall short in large-scale, heterogeneous networks due to limited computational efficiency and scalability. …”
Get full text
Article -
5002
Research on the effectiveness of data compression methods in relational and NoSQL DBMS
Published 2024-04-01“…Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.…”
Get full text
Article -
5003
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
5004
Addressing grading bias in rock climbing: machine and deep learning approaches
Published 2025-01-01“…The primary three approaches were from a route-centric, climber-centric, or path finding and path generation context. Of these, the most optimal methods used natural language processing or recurrent neural network algorithms. …”
Get full text
Article -
5005
Review of the Research on Underwater Explosion Ice-Breaking Technology
Published 2025-07-01“…Key findings establish that shock waves initiate brittle fracture via stress superposition while bubble pulsation drives crack propagation through pressure oscillation; optimal ice fragmentation depends critically on charge weight, standoff distance, and ice thickness. …”
Get full text
Article -
5006
Exploring Machine Learning Models for Vault Safety in ICL Implantation: A Comparative Analysis of Regression and Classification Models
Published 2025-06-01“…Regression and classification models were developed using gradient boosting, random forest, and CatBoost algorithms. Regression models predicted vault height as a continuous variable, while classification models categorized vault heights into binary and multi-class tasks. …”
Get full text
Article -
5007
Revolutionizing pharmacology: AI-powered approaches in molecular modeling and ADMET prediction
Published 2025-12-01“…The fusion of Artificial intelligence (AI) with computational chemistry has revolutionized drug discovery by enhancing compound optimization, predictive analytics, and molecular modeling. …”
Get full text
Article -
5008
ON TRAVERSABILITY COST EVALUATION FROM PROPRIOCEPTIVE SENSING FOR A CRAWLING ROBOT
Published 2015-12-01“…This paper addresses the problem of traversability cost evaluation based on proprioceptive sensing for a hexapod walking robot while optimizing different criteria. We present several methods of evaluating the robot-terrain interaction that can be used as a cost function for an assessment of the robot motion that can be utilized in high-level path-planning algorithms.…”
Get full text
Article -
5009
Advanced parameter tuning scheme for double CFO based fractional order composite controller synthesis method
Published 2025-12-01“…This method sequentially employs D-decomposition and optimization algorithms to address these challenges. …”
Get full text
Article -
5010
Utilizing UAVs in Wireless Networks: Advantages, Challenges, Objectives, and Solution Methods
Published 2024-10-01“…Additionally, we discuss the main methods and algorithms employed for UAV placement and trajectory optimization. …”
Get full text
Article -
5011
Deep Clustering of Student Code Strategies Using Multi-View Code Representation (CMVAE)
Published 2025-03-01“…The model captures structural features by transforming code into tree graphs and extracting centrality measures, while CodeBERT provides semantic embeddings. Through a joint optimization of reconstruction loss and clustering loss, the model effectively integrates multiple code representations. …”
Get full text
Article -
5012
Integrated Waste Management in the Circular Economy Era: Insights from Research and Practice
Published 2025-02-01“…Technological advancements, such as AI-driven waste sorting and route optimization algorithms, are highlighted alongside policy frameworks supporting circular economy principles. …”
Get full text
Article -
5013
Revolutionizing Supply Chain Management With AI: A Path to Efficiency and Sustainability
Published 2024-01-01“…Through an in-depth analysis of various AI techniques—such as machine learning, predictive analytics, and optimization algorithms—this study offers novel insights into their applicability in solving complex supply chain problems like demand forecasting, inventory management, and logistics optimization. …”
Get full text
Article -
5014
Privacy-preserving method for face recognition based on homomorphic encryption.
Published 2025-01-01“…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
Get full text
Article -
5015
A review on machine learning applications in hydrogen energy systems
Published 2025-03-01“…The paper provides an in-depth review of the literature, examining not only ML techniques but also optimization algorithms, evaluation methods, explainability techniques, and emerging technologies. …”
Get full text
Article -
5016
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
Published 2025-01-01“…This study focuses on optimizing and comparing various machine learning models for ASD diagnosis, while incorporating explainable AI techniques to ensure model transparency and interpretability. …”
Get full text
Article -
5017
In-situ data of occupant behavior and thermal comfort in 11 offices in a naturally ventilated building during 6 summersDataverse
Published 2025-08-01“…This dataset also facilitates the development of ventilation control algorithms and cascade cooling strategies by analyzing the conditions under which occupants use desk fans, helping optimize mixed-mode ventilation systems for comfort and efficiency.…”
Get full text
Article -
5018
Enhancing anomaly detection in IoT-driven factories using Logistic Boosting, Random Forest, and SVM: A comparative machine learning approach
Published 2025-07-01“…Abstract Three machine learning algorithms—Logistic Boosting, Random Forest, and Support Vector Machines (SVM)—were evaluated for anomaly detection in IoT-driven industrial environments. …”
Get full text
Article -
5019
SLR Systematic Literature Review: Metode Penilaian Kinerja Karyawan Menggunakan Human Performance Technology
Published 2023-11-01“…Therefore, this systematic literature review is carried out to identify the methods used for employee performance appraisal and mentions that optimization algorithms and fuzzy comprehensive methods are used as evaluation methods to assess performance appraisal methods. …”
Get full text
Article -
5020
Design of Gain-Scheduled Lateral Controllers for Autonomous Vehicles
Published 2024-11-01“…The results show that while traditional controllers, such as Pure Pursuit, perform adequately under constant speed conditions, adaptive model-based algorithms significantly enhance the performance, especially in dynamic driving situations involving speed variations.…”
Get full text
Article