-
3221
Synthesis of a reversible quantum Vedic multiplier on IBM quantum computers
Published 2025-05-01“…Abstract Quantum computers provide considerable potential to enhance computing technology, anticipated to surpass conventional computers by resolving intricate challenges that existing systems cannot tackle. They use quantum algorithms for improved performance and depend on reversible computations based on quantum physics and linear algebra. …”
Get full text
Article -
3222
Enhanced prediction of ventilator-associated pneumonia in patients with traumatic brain injury using advanced machine learning techniques
Published 2025-04-01“…XGBoost emerged as the top performing algorithm, achieving an AUC of 0.94 and an accuracy of 0.875 on the test set, marking substantial improvements over previously reported best results. …”
Get full text
Article -
3223
Skip-Connected CNN Exploiting BNN Surrogate for Antenna Modelling
Published 2025-01-01“…The combination of evolutionary algorithms with full-wave electromagnetic (EM) simulation software is an effective method for antenna optimal design. …”
Get full text
Article -
3224
Artificial intelligence tools for engagement prediction in neuromotor disorder patients during rehabilitation
Published 2024-12-01“…Results The study found that combining HRV and EDA features into a comprehensive dataset improved the synergistic representation of engagement compared to unimodal datasets. …”
Get full text
Article -
3225
Predictive framework of vegetation resistance in channel flow
Published 2025-03-01“…This study introduces a machine learning-based framework for predicting vegetation flow resistance, incorporating nine ML methods, including SVM, XGBoost, and BP. To improve predictive performance, optimization algorithms such as PSO, WSO, and RIME were applied. …”
Get full text
Article -
3226
Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence
Published 2025-06-01“…Optimization Algorithms: Developing efficient algorithms to solve linear fractional transshipment problem with multi-objective linear fractional functions. 4. …”
Get full text
Article -
3227
Fish Detection Using Deep Learning
Published 2020-01-01“…Authors of this article have learned the necessity of platform upgrade from a previous AUV design project, and would like to share the experience of one task extension in the area of fish detection. Because most of the embedded systems have been improved by fast growing computing and sensing technologies, which makes them possible to incorporate more and more complicated algorithms. …”
Get full text
Article -
3228
Dynamic SOFA component scores-based deep learning for short to long-term mortality prediction in sepsis survivors
Published 2025-07-01“…This model has the potential to assist clinicians in optimizing post-discharge management and improving follow-up care.…”
Get full text
Article -
3229
Integrated Energy Management in Small-Scale Smart Grids Considering the Emergency Load Conditions: A Combined Battery Energy Storage, Solar PV, and Power-to-Hydrogen System
Published 2024-12-01“…Compared to conventional evolutionary methods like particle swarm optimization, non-dominated sorting genetic algorithm III, and biogeography-based optimization, the proposed model exhibits remarkable improvements, outperforming them by 11.4%, 5.6%, and 11.6%, respectively. …”
Get full text
Article -
3230
FedACT: An adaptive chained training approach for federated learning in computing power networks
Published 2024-12-01“…We conduct extensive experiments on two datasets of CIFAR-10 and MNIST, and the results demonstrate that the proposed algorithm offers improved accuracy, diminished communication costs, and reduced network delays.…”
Get full text
Article -
3231
A Multi-Spatial-Scale Ocean Sound Speed Profile Prediction Model Based on a Spatio-Temporal Attention Mechanism
Published 2025-04-01“…Nowadays, spatio-temporal series prediction algorithms are emerging, but their prediction accuracy requires improvement. …”
Get full text
Article -
3232
The Emergence of AI-Driven Virtual Hospitals: Redefining Patient Care Beyond Physical Boundaries
Published 2025-04-01“…For example, AI-based support systems offer data-driven insights that improve diagnostic accuracy and patient outcomes thus transforming healthcare delivery 3. …”
Get full text
Article -
3233
A neighborhood search-based heuristic for the dynamic vehicle routing problem
Published 2025-05-01“…The DSNR achieved improvements of 15% to 17% in terms of distance and final delivery costs.…”
Get full text
Article -
3234
A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication
Published 2025-05-01“…To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. …”
Get full text
Article -
3235
A Cross-Stage Focused Small Object Detection Network for Unmanned Aerial Vehicle Assisted Maritime Applications
Published 2025-01-01“…The CFSD-UAVNet model was evaluated on the publicly available SeaDronesSee maritime dataset and compared with other cutting-edge algorithms. The experimental results showed that the CFSD-UAVNet model achieved an mAP@50 of 80.1% with only 1.7 M parameters and a computational cost of 10.2 G, marking a 12.1% improvement over YOLOv8 and a 4.6% increase compared to DETR. …”
Get full text
Article -
3236
Foreign object detection on coal conveyor belt enhanced by attention mechanism
Published 2025-06-01Get full text
Article -
3237
Edge-Fog Computing-Based Blockchain for Networked Microgrid Frequency Support
Published 2025-01-01“…The parameters and hyperparameters of the LSTM-MFPC are optimized using the Bayesian Adaptive Direct Search (BADS) algorithm. …”
Get full text
Article -
3238
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
3239
Comparison of Machine Learning Methods for Predicting Electrical Energy Consumption
Published 2025-02-01“…Data pre-processing, specifically min-max normalization, is crucial for improving the accuracy of distance-based algorithms like KNN. …”
Get full text
Article -
3240
Selective Cleaning Enhances Machine Learning Accuracy for Drug Repurposing: Multiscale Discovery of MDM2 Inhibitors
Published 2025-07-01“…Cancer remains one of the most formidable challenges to human health; hence, developing effective treatments is critical for saving lives. …”
Get full text
Article