-
14041
A Deep Learning Based Traffic State Estimation Method for Mixed Traffic Flow Environment
Published 2022-01-01“…This article presents a traffic state estimation method based on a deep learning algorithm under a low and dynamic CVs penetration rate environment. …”
Get full text
Article -
14042
C-BERT: A Mongolian reverse dictionary based on fused lexical semantic clustering and BERT
Published 2025-01-01“…Initially, the K-means algorithm was used to cluster preprocessed entries from well-known Mongolian dictionaries into 5000 clusters, forming a comprehensive training set. …”
Get full text
Article -
14043
Kinetics of Austenite Formation in a Medium-Carbon, Low-Alloy Steel with an Initial Martensite Microstructure: Influence of Prior Austenite Grain Size
Published 2025-01-01“…The differences in austenite formation kinetics as a function of prior austenite grain size were quantified and modeled in the framework of diffusion-controlled nucleation and growth theories using the genetic algorithm optimization.…”
Get full text
Article -
14044
MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION
Published 2024-12-01“…The data collection algorithm was summarized and the analysis of the main elements of the marketing research process for the field of public administration was carried out, in particular, the question of qualitative research methods, which can be used when collecting primary information from respondents, was investigated in detail. …”
Get full text
Article -
14045
Machine vision model for drip leakage detection of pipeline.
Published 2025-01-01“…The droplet boundary extraction algorithm is proposed, and the three-dimensional model of the target droplet is established, so the volume calculation problem of the droplet is solved, which provides a way of thinking for drip leakage detection of the pipeline.…”
Get full text
Article -
14046
Automated speech therapy through personalized pronunciation correction using reinforcement learning and large language models
Published 2025-03-01“…The system employs a custom Proximal Policy Optimization (PPO) algorithm for precise pronunciation evaluation and an Large Language Models to deliver detailed, encouraging, and user-specific feedback. …”
Get full text
Article -
14047
Back Analysis of Rock Hydraulic Fracturing by Coupling Numerical Model and Computational Intelligent Technology
Published 2017-01-01“…The artificial bee colony algorithm is applied in back analysis to find the optimal in situ stress and elastic parameters. …”
Get full text
Article -
14048
Information Security Risk Management Model for Big Data
Published 2022-01-01“…On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. …”
Get full text
Article -
14049
Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method
Published 2025-02-01“…Then, the complex network theory and PageRank algorithm were utilised to calculate the importance of every node in directed-weighted network formed by those accident chains. …”
Get full text
Article -
14050
Cost-efficient behavioral modeling of antennas by means of global sensitivity analysis and dimensionality reduction
Published 2025-01-01“…Our methodology involves a rapid global sensitivity analysis (GSA) algorithm developed to determine a set of parameter space directions that maximize antenna response variability. …”
Get full text
Article -
14051
High Performance 3D PET Reconstruction Using Spherical Basis Functions on a Polar Grid
Published 2012-01-01“…In this work, we have implemented the reconstruction algorithm using Graphical Processing Unit (GPU) technology for speed and a precomputed Monte-Carlo-calculated SRM for accuracy. …”
Get full text
Article -
14052
A multi-task genetic programming approach for online multi-objective container placement in heterogeneous cluster
Published 2024-11-01“…Comprehensive experiments show that the proposed algorithm can improve the resource utilization of clusters, reduce the number of physical machines, and effectively meet resource constraints and high availability requirements.…”
Get full text
Article -
14053
Detection of COVID-19 Using Protein Sequence Data via Machine Learning Classification Approach
Published 2023-01-01“…To optimize performance, we employed machine learning classification algorithms such as K-nearest neighbor (KNN), XGBoost, and Naïve Bayes, along with feature selection techniques like genetic algorithm (GA), LASSO, and support vector machine recursive feature elimination (SVM-RFE). …”
Get full text
Article -
14054
Self-Organizing Mapping Neural Network Implementation Based on 3-D NAND Flash for Competitive Learning
Published 2024-01-01“…Self-organizing Map (SOM) neural network is a prominent algorithm in unsupervised machine learning, which is widely used for data clustering, high-dimensional visualization, and feature extraction. …”
Get full text
Article -
14055
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01“…The selected features are evaluated by using the Random Forest (RF) algorithm to combine multiple decision trees and create an accurate result. …”
Get full text
Article -
14056
Iterative Learning Observer-Based High-Precision Motion Control for Repetitive Motion Tasks of Linear Motor-Driven Systems
Published 2024-01-01“…A recursive least squares (RLS) algorithm-based indirect adaptation strategy is used to achieve high-accuracy parameter estimation and model compensation. …”
Get full text
Article -
14057
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01“…The change in channel capacity and utilization augments the need for security through 2-level key shared authentication. The deep learning algorithm verifies the authentication completeness for maximum channel capacity utilization irrespective of adversary interference. …”
Get full text
Article -
14058
Torque Prediction In Deep Hole Drilling: Artificial Neural Networks Versus Nonlinear Regression Model
Published 2025-12-01“…In this paper, we have developed a two-layer artificial neural network (ANN) model for training using the Levenberg-Marquardt algorithm to predict torque during deep drilling. Unlike many previous studies, this model uses hole depth as an input vector element instead of hole diameter. …”
Get full text
Article -
14059
FPGA-Based Implementation of All-Digital QPSK Carrier Recovery Loop Combining Costas Loop and Maximum Likelihood Frequency Estimator
Published 2014-01-01“…Besides, considering that, for MLFE, the accurate estimation of frequency offset is associated with the linear characteristic of its frequency discriminator (FD), the Coordinate Rotation Digital Computer (CORDIC) algorithm is introduced into the FD based on MLFE to unwrap linearly phase difference. …”
Get full text
Article -
14060
Memory consolidation from a reinforcement learning perspective
Published 2025-01-01“…This framework closely parallels Dyna, a reinforcement learning algorithm introduced by Sutton in 1991. In Dyna, an agent performs offline simulations to supplement trial-and-error value learning, greatly accelerating the learning process. …”
Get full text
Article