-
1681
PSO Tuned Super-Twisting Sliding Mode Controller for Trajectory Tracking Control of an Articulated Robot
Published 2025-01-01“…Numerical simulations revealed that the tracking error and root mean square error (RMSE) improvements were approximately 18.33%, 16.66%, and 14.29% for PSO–STSMC compared to STSMC, and 79.50%, 78.04%, and 25.0% compared to PSO–SMC for each of the three joints under ideal conditions, respectively. …”
Get full text
Article -
1682
An Efficient Design of DCT Approximation Based on Quantum Dot Cellular Automata (QCA) Technology
Published 2019-01-01“…Optimization for power is one of the most important design objectives in modern digital image processing applications. …”
Get full text
Article -
1683
An AIoT-Based Automated Farming Irrigation System for Farmers in Limpopo Province
Published 2024-06-01“…A machine learning precipitation prediction algorithm optimizes water usage. The paper also describes a system with multiple sensors that detect soil parameters, and automatically irrigate land based on soil moisture by switching the motor on/off. …”
Get full text
Article -
1684
Artificial intelligence tools for engagement prediction in neuromotor disorder patients during rehabilitation
Published 2024-12-01“…Results The study found that combining HRV and EDA features into a comprehensive dataset improved the synergistic representation of engagement compared to unimodal datasets. …”
Get full text
Article -
1685
Predictive framework of vegetation resistance in channel flow
Published 2025-03-01“…This study introduces a machine learning-based framework for predicting vegetation flow resistance, incorporating nine ML methods, including SVM, XGBoost, and BP. To improve predictive performance, optimization algorithms such as PSO, WSO, and RIME were applied. …”
Get full text
Article -
1686
Fish Detection Using Deep Learning
Published 2020-01-01“…Authors of this article have learned the necessity of platform upgrade from a previous AUV design project, and would like to share the experience of one task extension in the area of fish detection. Because most of the embedded systems have been improved by fast growing computing and sensing technologies, which makes them possible to incorporate more and more complicated algorithms. …”
Get full text
Article -
1687
Dynamic SOFA component scores-based deep learning for short to long-term mortality prediction in sepsis survivors
Published 2025-07-01“…This model has the potential to assist clinicians in optimizing post-discharge management and improving follow-up care.…”
Get full text
Article -
1688
A Multi-Spatial-Scale Ocean Sound Speed Profile Prediction Model Based on a Spatio-Temporal Attention Mechanism
Published 2025-04-01“…Nowadays, spatio-temporal series prediction algorithms are emerging, but their prediction accuracy requires improvement. …”
Get full text
Article -
1689
The Mode of Constructing Safe Trajectories of Motion of the Unmanned Aerial Vehicle while Monitoring Power Lines Considering the Influence of their Electromagnetic Fields
Published 2019-12-01“…This leads to poorer image processing performance and causes additional errors. To improve evaluation of power line characteristics, the algorithm of aerial imaging is proposed, which in-cludes vehicle position adjustment relative to wire for two imaging settings. …”
Get full text
Article -
1690
Foreign object detection on coal conveyor belt enhanced by attention mechanism
Published 2025-06-01Get full text
Article -
1691
Edge-Fog Computing-Based Blockchain for Networked Microgrid Frequency Support
Published 2025-01-01“…The parameters and hyperparameters of the LSTM-MFPC are optimized using the Bayesian Adaptive Direct Search (BADS) algorithm. …”
Get full text
Article -
1692
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
1693
Comparison of Machine Learning Methods for Predicting Electrical Energy Consumption
Published 2025-02-01“…Data pre-processing, specifically min-max normalization, is crucial for improving the accuracy of distance-based algorithms like KNN. …”
Get full text
Article -
1694
Selective Cleaning Enhances Machine Learning Accuracy for Drug Repurposing: Multiscale Discovery of MDM2 Inhibitors
Published 2025-07-01“…Cancer remains one of the most formidable challenges to human health; hence, developing effective treatments is critical for saving lives. …”
Get full text
Article -
1695
Intracardiac abscess in the clinical course of infective endocarditis complicated by acute heart failure
Published 2024-12-01“…Objective: to determine the optimal diagnostic and treatment algorithm for patients with infective endocarditis complicated by acute heart failure (AHF) and intracardiac abscess. …”
Get full text
Article -
1696
Intelligent Data Reduction for IoT: A Context-Driven Framework
Published 2025-01-01“…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
Get full text
Article -
1697
Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems
Published 2020-01-01“…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
Get full text
Article -
1698
DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions
Published 2025-01-01“…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
Get full text
Article -
1699
Deep Mining on the Formation Cycle Features for Concurrent SOH Estimation and RUL Prognostication in Lithium-Ion Batteries
Published 2025-04-01“…Models that integrate all formation-related data yielded the lowest root mean square error (RMSE) of 2.928% for capacity estimation and 16 cycles for RUL prediction, highlighting the significant role of surface-level physical features in improving accuracy. …”
Get full text
Article -
1700
A New Approach to ORB Acceleration Using a Modern Low-Power Microcontroller
Published 2025-06-01“…This work also allows for future optimizations that will improve the results of this paper.…”
Get full text
Article