-
14581
Effective practices in enhancing autonomous English language learning through YouTube
Published 2025-02-01“…However, the study identifies significant challenges, including the overwhelming quantity and variable quality of available content, which may hinder learners’ ability to find reliable sources. The platform’s algorithm-driven design can also distract learners, reducing their focus and productivity. …”
Get full text
Article -
14582
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
Get full text
Article -
14583
A lightweight weed detection model for cotton fields based on an improved YOLOv8n
Published 2025-01-01“…This study proposes the YOLO-Weed Nano algorithm based on the improved YOLOv8n model. First, the Depthwise Separable Convolution (DSC) structure is used to improve the HGNetV2 network, creating the DS_HGNetV2 network to replace the backbone of the YOLOv8n model. …”
Get full text
Article -
14584
Digital Sovereignty in times of AI: between perils of hegemonic agendas and possibilities of alternative approaches
Published 2024-12-01“…Predominant perspectives often focus on state, market, or individual sovereignty over data, algorithms, and AI models. However, through document and discourse analysis, the article examines alternative approaches such as sustainable, grassroots, and feminist digital sovereignties and those led by communities or indigenous peoples. …”
Get full text
Article -
14585
Spatial Modeling of Airborne Particles (PM2.5 and PM10) in Tehran city Using Convolutional Neural Network.
Published 2024-03-01“…This study presents an approach for air quality management in Tehran using the Convolutional Neural Network (CNN) algorithm. The proposed method provides the possibility of spatial modeling and preparation of risk maps of two important air pollutants, namely particulate matter 2.5 (PM2.5) and particulate matter 10 (PM10). …”
Get full text
Article -
14586
Noise-immune zeroing neural dynamics for dynamic signal source localization system and robotic applications in the presence of noise
Published 2025-02-01“…The NIZND model is a brain-inspired algorithm that incorporates an integral term and an activation function into the traditional zeroing neural dynamics (ZND) model, designed to effectively mitigate noise interference during localization tasks. …”
Get full text
Article -
14587
DDC_Calc, software to diagnose developmental dysplasia of the hip in infants (version 1)
Published 2023-02-01“…The Viola-Jones artificial vision algorithm was used for the detection of the structures, as well as a rule-based system with a view to a diagnostic suggestion. …”
Get full text
Article -
14588
Analysis and Optimization of Influencing Factors for Turnout Lateral Passing Performance of Rubber-tired Metro
Published 2025-01-01“…The parameters with greater influence are optimized by using the non-dominated sorting genetic algorithm-II. [Result & Conclusion] With the vertical force of the running wheel, the lateral force of the guide wheel, the lateral force of the axle, the load transfer coefficient of the running wheel, and the roll angle of the car body as evaluation indexes, it is concluded that the vertical stiffness of air spring has the greatest impact on the turnout lateral passing performance of rubber-tired metro vehicles, followed by the damping of the vertical shock absorber and the radial stiffness of the guide wheel and etc. …”
Get full text
Article -
14589
Model Error Correction in Data Assimilation by Integrating Neural Networks
Published 2019-06-01“…The effectiveness of the proposed algorithm is validated by examples and by a sensitivity study.…”
Get full text
Article -
14590
A Framework for Detecting Vehicle Occupancy Based on the Occupant Labeling Method
Published 2020-01-01“…This study overcomes these limits and proposes an overall framework for an algorithm that effectively detects occupants in vehicles using photographic data. …”
Get full text
Article -
14591
Linking interannual variability of turbidity fronts in the Eastern China Seas to local processes and ocean warming
Published 2025-02-01“…A gradient-based front detection algorithm and frontal probability are used to identify the geographical locations of turbidity fronts and their variability at the interannual scale, respectively. …”
Get full text
Article -
14592
Recognizing Cognitive and Psychiatric Changes in the Post-Highly Active Antiretroviral Therapy Era
Published 2012-01-01“…Specifically addressed in the present review are the International HIV Dementia Scale, a novel screening equation and algorithm for HAND, as well as brief, validated, verbal questionnaires for detection of depression and substance abuse. …”
Get full text
Article -
14593
A Vision-Based Video Crash Detection Framework for Mixed Traffic Flow Environment Considering Low-Visibility Condition
Published 2020-01-01“…First, Retinex image enhancement algorithm was introduced to improve the quality of images, collected under low-visibility conditions (e.g., heavy rainy days, foggy days and dark night with poor lights). …”
Get full text
Article -
14594
Bounded rational real‐time charging pricing strategy under the traffic‐grid coupling network
Published 2022-12-01“…Finally, the particle swarm optimisation algorithm is used to solve the game model so as to solve the real‐time charging price under various constraints. …”
Get full text
Article -
14595
Macro Modeling of Column Removal in RC Frames with Consideration of Importance Factor and Infill Walls
Published 2023-05-01“…Finally, a proposed approach for column removal in NDA via OpenSees program is introduced, and its high accuracy is shown. This developed algorithm can remove any element of structure in different time intervals.…”
Get full text
Article -
14596
Current Trends in the Development of Reporting in the Sphere of Investments in Human Capital
Published 2024-08-01“…In the process of work, a system of updated reporting on the level of payment of human capital of employees was developed, taking into account current needs and the possibility of ranking employees by category. Also, a visual algorithm of the process of forming an updated reporting form from primary documents to the corresponding result was created separately. …”
Get full text
Article -
14597
Improved YOLOX-DeepSORT for Multitarget Detection and Tracking of Automated Port RTG
Published 2024-01-01“…This article introduces a multitarget detection and tracking (MTDT) algorithm specifically tailored for automated port RTG operations. …”
Get full text
Article -
14598
Dynamic Spatiotemporal Causality Analysis for Network Traffic Flow Based on Transfer Entropy and Sliding Window Approach
Published 2021-01-01“…This study proposes a dynamic spatiotemporal causality modeling approach to analyze traffic causal relationships for the large-scale road network. Transfer entropy algorithm is utilized to detect the spatiotemporal causality of network traffic states based on the extensive traffic time series data, which could measure the amount and direction of information transmission. …”
Get full text
Article -
14599
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
Get full text
Article -
14600
Calibration of Microscopic Traffic Flow Simulation Models considering Subsets of Links and Parameters
Published 2020-01-01“…Traffic volume and speed are the performance measures used in this study, and the methodology is developed without considering the characteristics of a specific traffic flow model. A genetic algorithm was implemented to find a solution to the proposed mathematical program. …”
Get full text
Article