-
321
A Novel Tornado Detection Algorithm Based on XGBoost
Published 2025-01-01“…In addition, the TDA-XGB algorithm combines artificial intelligence-assisted learning to optimize the traditional algorithm based on the tornado vortex signature (TVS) and tornado debris signature (TDS), further improving the detection effect. …”
Get full text
Article -
322
Algorithms for Integrated Object Detection in Wireless Sensor Networks
Published 2025-05-01“…Wireless sensor networks can be used to solve various economic problems, including detection of objects (phenomena) of interest. Most of the well-known information processing algorithms in such networks are built according to a radial architecture. …”
Get full text
Article -
323
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01“…Optimization of pharmacotherapy by prescribing drugs with fixed combinations can improve control of drug administration. …”
Get full text
Article -
324
Dynamic parking space allocation at urban scale: Problem formulation and resolution
Published 2022-11-01Get full text
Article -
325
Application of Artificial Intelligence Computer Intelligent Heuristic Search Algorithm
Published 2022-01-01“…After 231 iterations of particle swarm optimization algorithm, the optimal value is 6.83650785e-001. …”
Get full text
Article -
326
Optimal Design of Integrating Two‐Level Artificial Intelligent With Three Degrees of Freedom‐PDF (TLNF‐3DOFPDF) Controller for AGC of Three‐Area Multi‐Sources Power System...
Published 2025-04-01“…Controller parameters are fine‐tuned using a novel metaheuristic method called the Skill Optimization Algorithm (SOA). The research assesses controller performance using multiple indices Integral of Time‐weighted Squared Error (ITSE), Integral of Squared Error (ISE), Integral of Time‐weighted Absolute Error (ITAE), and Integral of Absolute Error (IAE) and finds that ISE yields the most optimal results. …”
Get full text
Article -
327
Research on SBMPC Algorithm for Path Planning of Rescue and Detection Robot
Published 2020-01-01“…This research aims to improve autonomous navigation of coal mine rescue and detection robot, eliminate the danger for rescuers, and enhance the security of rescue work. …”
Get full text
Article -
328
A Global Path Planning Algorithm Based on Bidirectional SVGA
Published 2017-01-01“…This algorithm does not construct a visibility graph before the path optimization. …”
Get full text
Article -
329
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
330
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
331
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01Get full text
Article -
332
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…The results confirm the efficiency of the proposed feature selection method in improving Arabic Text Classification accuracy. Keywords: Arabic Natural Language Processing, Feature Selection, Firefly optimization method, Text Classification…”
Get full text
Article -
333
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
334
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
335
AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection
Published 2025-05-01“…Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. …”
Get full text
Article -
336
Visual Multiple-object Tracking Algorithm Based on Motion Consistency
Published 2023-08-01“…The algorithm aims to improve the stability in tracking multiple objects with similar appearance features and motion patterns, while maintaining stability in normal cases. …”
Get full text
Article -
337
HUMAN EMOTION RECOGNITION SYSTEM USING DEEP LEARNING ALGORITHMS
Published 2022-09-01“…Therefore, the purpose of the work is to find and optimize the most satisfactory in terms of accuracy algorithm for classifying human emotions based on facial images. …”
Get full text
Article -
338
Implications of algorithmic bias in AI-driven emergency response systems
Published 2026-01-01“…Unlike existing research, which mostly addresses technical or ethical aspects in isolation, our approach integrates economic theory with algorithmic fairness to quantify and systematically analyze how biases in data quality and algorithm design impact resource allocation efficiency, response time equity, healthcare outcomes, and social welfare. …”
Get full text
Article -
339
Methods and Algorithms for Predictive Analytics of Time Series in Energy Consumption
Published 2024-03-01“…In most cases, energy efficiency improvements are proving to be the most cost-effective way to combat climate change, simultaneously reducing energy waste, saving money, and enabling affordable expansion of renewable energy. …”
Get full text
Article -
340
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article