-
13921
Advanced Approach of Multiagent Based Buoy Communication
Published 2015-01-01“…The proposed management of buoy communication is based on a clustering algorithm, which enables the performance of the hydrometeorological information system to be enhanced. …”
Get full text
Article -
13922
Enhanced Vector Quantization for Embedded Machine Learning: A Post-Training Approach With Incremental Clustering
Published 2025-01-01“…While VQ is a technique that reduces model size by grouping similar parameters, incremental clustering, implemented via the AutoCloud K-Fixed algorithm, preserves accuracy during compression. This combined approach was validated on an automotive dataset predicting CO2 emissions from vehicle sensor measurements such as mass air flow, intake pressure, temperature, and speed. …”
Get full text
Article -
13923
Data traceability mechanism based on consortium chain
Published 2023-10-01“…With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow between different blockchains, new security issues arise.Cross-chain data transmission can lead to data leakage, and detecting data leakage caused by illegal access becomes challenging.To address these problems, a data traceability mechanism based on a consortium chain was proposed.A cross-blockchain data traceability model was designed, incorporating private data pipelines to ensure the security of cross-chain data transmission.User behaviors were recorded through authorization and access logs, ensuring the traceability of illegal unauthorized access.To improve the efficiency of data traceability and query, an on-chain and off-chain synchronous storage mechanism was adopted.The state of data flow before each transaction was encrypted and stored in the database, and its index was stored in the blockchain transaction.This enables a one-to-one correspondence between on-chain and off-chain data.Additionally, Merkle trees were introduced into the block body to store block summaries, enhancing the efficiency of block legitimacy verification.Based on the data storage form and cross-chain data interaction mechanism, a data traceability algorithm was designed.The traceability results were displayed in the form of an ordered tree.An experimental environment for consortium chain traceability was built using fabric, targeting the cross-domain data traceability scenario in the e-commerce industry.The GO language was used to simulate and test the data traceability performance with a large number of blocks and transactions.The results demonstrate that with the increasing number of blocks and transactions, the proposed data traceability mechanism maintains satisfactory performance.…”
Get full text
Article -
13924
Teaching-Learning-Based Optimization with Learning Enthusiasm Mechanism and Its Application in Chemical Engineering
Published 2018-01-01“…Teaching-learning-based optimization (TLBO) is a population-based metaheuristic search algorithm inspired by the teaching and learning process in a classroom. …”
Get full text
Article -
13925
Automatic Player Face Detection and Recognition for Players in Cricket Games
Published 2024-01-01“…The system utilizes the AdaBoost algorithm for player and player face detection, employing a PAL based face recognition model to recognize the faces of players on the field. …”
Get full text
Article -
13926
Control of Magnetic Manipulator Using Reinforcement Learning Based on Incrementally Adapted Local Linear Models
Published 2021-01-01“…We have introduced modifications to the RFWR algorithm to better suit the low-dimensional continuous-time systems we are mostly dealing with. …”
Get full text
Article -
13927
Reentry Capsule Reachable Tube Boundary Prediction via Evolutionary Multiobjective Optimization
Published 2024-01-01“…Ultimately, the multiobjective evolutionary algorithm based on decomposition was employed to solve the multiobjective optimization model, and the geometric boundary of the tube corresponds to the Pareto front of the multiobjective optimization. …”
Get full text
Article -
13928
Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience
Published 2024-03-01“…The formation of a basic threat model for critical infrastructure facilities, which should include related models of the facility, situation and intruder, is currently an important element of the algorithm for solving this problem. The basic model of threats to critical infrastructure is the framework on which the state determines who and what it needs to protect itself from at the national level. …”
Get full text
Article -
13929
Efficiency and Reliability Analysis of Self-Adaptive Two-Stage Fuzzy Control System in Complex Traffic Environment
Published 2022-01-01“…Aiming at the problems of the parameters of membership functions empirical settings and insufficient response to the real-time fluctuation in traffic flow, the controller introduces an improved hybrid genetic algorithm to solve it and enable the controller to self-learn. …”
Get full text
Article -
13930
Identifying urban, transportation, and socioeconomic characteristics across US zip codes affecting CO2 emissions: A decision tree analysis
Published 2025-06-01“…The dataset was carefully prepared to ensure accuracy and relevance, considering temporal, geographical, and socioeconomic heterogeneity. The Decision Tree algorithm was applied iteratively to evaluate variable interactions and identify critical thresholds that influence carbon emissions. …”
Get full text
Article -
13931
Log-Based Analysis of Creativity in the Context of Computational Thinking
Published 2024-12-01“…We developed a Python algorithm to automatically analyze the logged solutions across four creativity measures. …”
Get full text
Article -
13932
Integration of flexible corporate demographic policy tools into the personnel management system
Published 2024-11-01“…The paper presents a model and an algorithm for integrating flexible organizational and labour tools of corporate demographic policy into the personnel management system. …”
Get full text
Article -
13933
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Published 2022-01-01“…As shown in the experimental results, the proposed HTs are hardly detected even by the novel HT detection approach based on machine learning algorithm. These HTs have small footprints on the design in terms of area and power to resist the side‐channel effect analysis. …”
Get full text
Article -
13934
Haptic Manipulation of Deformable Objects in Hybrid Bilateral Teleoperation System
Published 2007-01-01“…The virtual environment of this hybrid bilateral teleoperation system combines collision detection algorithms, dynamical, kinematical and geometrical models with a position–position and/or force–position bilateral control algorithm, to produce on the operator side the reflected forces corresponding to the virtual mechanical interactions, through a haptic device. …”
Get full text
Article -
13935
Adaptive Model Predictive Vibration Control of a Cantilever Beam with Real-Time Parameter Estimation
Published 2014-01-01“…The model predictive control algorithm generates state predictions and dual-mode quadratic cost prediction matrices based on the updated discrete state-space models. …”
Get full text
Article -
13936
Neural Network and Home Hydroponics
Published 2023-06-01“…Further practical tests showed an increase in energy efficiency by 32.3%, compared to the classical control algorithm at close values of plant transpiration. …”
Get full text
Article -
13937
Intelligence analysis of drug nanoparticles delivery efficiency to cancer tumor sites using machine learning models
Published 2025-01-01“…To further model performance and strength, the study also applied cutting-edge methods including the Firefly Algorithm for hyperparameter tuning and Recursive Feature Elimination (RFE) for feature selection. …”
Get full text
Article -
13938
Multiple programmed cell death patterns predict the prognosis and drug sensitivity in gastric cancer
Published 2025-02-01“…Immune cell infiltration, immune checkpoint expression, Tumor Immune Dysfunction and Exclusion (TIDE) algorithm and drug sensitivity analysis were used to explore immunotherapy response. …”
Get full text
Article -
13939
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Furthermore, by integrating the algorithm with the high‐performance RL framework, sample factory, EPPTA significantly reduces convergence time compared to existing pen‐testing methods, resulting in an approximately 20‐fold acceleration. …”
Get full text
Article -
13940
Deadlock Prevention Policy with Behavioral Optimality or Suboptimality Achieved by the Redundancy Identification of Constraints and the Rearrangement of Monitors
Published 2015-01-01“…For the possible existence of new siphons generated after the first phase, we add monitors with their output arcs first pointed to source transitions at the second phase to avoid new siphons generating and then rearrange the output arcs step by step on condition that liveness is preserved. In addition, an algorithm is proposed to remove the redundant constraints of the MIP problem in this paper. …”
Get full text
Article