-
1301
Fish Detection Using Deep Learning
Published 2020-01-01“…Authors of this article have learned the necessity of platform upgrade from a previous AUV design project, and would like to share the experience of one task extension in the area of fish detection. Because most of the embedded systems have been improved by fast growing computing and sensing technologies, which makes them possible to incorporate more and more complicated algorithms. …”
Get full text
Article -
1302
A Multi-Spatial-Scale Ocean Sound Speed Profile Prediction Model Based on a Spatio-Temporal Attention Mechanism
Published 2025-04-01“…Nowadays, spatio-temporal series prediction algorithms are emerging, but their prediction accuracy requires improvement. …”
Get full text
Article -
1303
The Mode of Constructing Safe Trajectories of Motion of the Unmanned Aerial Vehicle while Monitoring Power Lines Considering the Influence of their Electromagnetic Fields
Published 2019-12-01“…This leads to poorer image processing performance and causes additional errors. To improve evaluation of power line characteristics, the algorithm of aerial imaging is proposed, which in-cludes vehicle position adjustment relative to wire for two imaging settings. …”
Get full text
Article -
1304
Edge-Fog Computing-Based Blockchain for Networked Microgrid Frequency Support
Published 2025-01-01“…The parameters and hyperparameters of the LSTM-MFPC are optimized using the Bayesian Adaptive Direct Search (BADS) algorithm. …”
Get full text
Article -
1305
Comparison of Machine Learning Methods for Predicting Electrical Energy Consumption
Published 2025-02-01“…Data pre-processing, specifically min-max normalization, is crucial for improving the accuracy of distance-based algorithms like KNN. …”
Get full text
Article -
1306
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
1307
Selective Cleaning Enhances Machine Learning Accuracy for Drug Repurposing: Multiscale Discovery of MDM2 Inhibitors
Published 2025-07-01“…Cancer remains one of the most formidable challenges to human health; hence, developing effective treatments is critical for saving lives. …”
Get full text
Article -
1308
Intracardiac abscess in the clinical course of infective endocarditis complicated by acute heart failure
Published 2024-12-01“…Objective: to determine the optimal diagnostic and treatment algorithm for patients with infective endocarditis complicated by acute heart failure (AHF) and intracardiac abscess. …”
Get full text
Article -
1309
Intelligent Data Reduction for IoT: A Context-Driven Framework
Published 2025-01-01“…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
Get full text
Article -
1310
Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems
Published 2020-01-01“…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
Get full text
Article -
1311
DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions
Published 2025-01-01“…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
Get full text
Article -
1312
Deep Mining on the Formation Cycle Features for Concurrent SOH Estimation and RUL Prognostication in Lithium-Ion Batteries
Published 2025-04-01“…Models that integrate all formation-related data yielded the lowest root mean square error (RMSE) of 2.928% for capacity estimation and 16 cycles for RUL prediction, highlighting the significant role of surface-level physical features in improving accuracy. …”
Get full text
Article -
1313
A New Approach to ORB Acceleration Using a Modern Low-Power Microcontroller
Published 2025-06-01“…This work also allows for future optimizations that will improve the results of this paper.…”
Get full text
Article -
1314
Delphi consensus statement for the management of delayed post-polypectomy bleeding
Published 2025-04-01“…These recommendations aim to improve patient outcomes and optimize healthcare resources while fostering a standardized approach to this common adverse event.…”
Get full text
Article -
1315
Non-destructive assessment of hemp seed vigor using machine learning and deep learning models with hyperspectral imaging
Published 2025-06-01“…By enabling rapid and objective seed selection, this technology can improve the efficiency of hemp seed production and ultimately lead to higher crop yields. …”
Get full text
Article -
1316
XGBoost based enhanced predictive model for handling missing input parameters: A case study on gas turbine
Published 2024-12-01“…The model is built to anticipate the gas turbine's Energy Yield (EY) output, optimize energy production efficiency, improve maintenance schedules, and enable operational decision-making within the power plant. …”
Get full text
Article -
1317
Precise GNSS Positioning with Time-differenced Carrier Phases at Variable Sampling Rates
Published 2025-07-01“…Most Global Navigation Satellite System (GNSS) receivers typically have a sampling rate at 1Hz. …”
Get full text
Article -
1318
A Fault Detection Framework for Rotating Machinery with a Spectrogram and Convolutional Autoencoder
Published 2025-07-01“…In modern industrial systems, establishing the optimal maintenance policy for rotating machinery is essential to improve productivity and prevent catastrophic accidents. …”
Get full text
Article -
1319
Intelligent Trust Evaluation Method for Underwater Sensor Networks Based on Fuzzy Clustering and Dynamic Weight Allocation
Published 2025-04-01“…Then, the unsupervised machine learning algorithm, namely fuzzy C-means clustering, was employed to enable adaptive node trust decision-making. …”
Get full text
Article -
1320
A Pythagorean fuzzy MCDM model for evaluating career happiness in sports by selecting a suitable sport
Published 2025-07-01“…We present the MCDM algorithm for AHP and the derived AOs, offering solutions to practical numerical examples and identifying optimal sports options that improve career happiness. …”
Get full text
Article