-
1261
A Deep Learning Framework for Chronic Kidney Disease stage classification
Published 2025-06-01“…Statistical tests, including the Friedman and Nemenyi post-hoc test, identified the CNN model trained with MHMXAI-selected features as the most robust choice for CKD stage prediction. …”
Get full text
Article -
1262
Retracted: Computer Medical Image Segmentation Based on Neural Network
Published 2020-01-01“…Image segmentation in medical imaging has long been a problem in radiological image processing. Most of the image segmentation methods in traditional vision algorithms are difficult to achieve high-resolution image segmentation due to the complexity of the algorithm. …”
Get full text
Article -
1263
Machine learning analysis of molecular dynamics properties influencing drug solubility
Published 2025-07-01“…Through rigorous analysis, the properties with the most significant influence on solubility were identified and subsequently used as input features for four ensemble machine learning algorithms: Random Forest, Extra Trees, XGBoost, and Gradient Boosting. …”
Get full text
Article -
1264
Intelligent library shelf management system for open-access environments: A CNN-based approach with enhanced image recognition and disorder detection
Published 2025-12-01“…The new system adopts an optimized convolutional kernel design to improve the accuracy of feature extraction. …”
Get full text
Article -
1265
Adaptive Variational Modal Decomposition–Dual Attention Mechanism Parallel Residual Network: A Tool Lifetime Prediction Method Based on Adaptive Noise Reduction
Published 2024-12-01“…The method first adapts the parameters of the variational modal noise reduction algorithm using an improved sparrow optimization algorithm, and then reconstructs the original vibration signal with noise reduction. …”
Get full text
Article -
1266
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
1267
Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China
Published 2022-01-01“…The main purpose of this research is to apply the logistic regression (LR) model, the support vector machine (SVM) model based on radial basis function, the random forest (RF) model, and the coupled model of the whale optimization algorithm (WOA) and genetic algorithm (GA) with RF, to make landslide susceptibility mapping for the Ankang City of Shaanxi Province, China. …”
Get full text
Article -
1268
Inverse Kinematics of a 7-Degree-of-Freedom Robotic Arm Based on Deep Reinforcement Learning and Damped Least Squares
Published 2025-01-01“…In this paper, we propose a novel solution to the inverse kinematics problem by combining Proximal Policy Optimization (PPO) with the Damped Least Squares (DLS) method, forming the Multistep PPO-DLS Inverse Kinematics (MPDIK) algorithm. …”
Get full text
Article -
1269
Cost-effectiveness analysis of best management practices for non-point source pollution in watersheds: A review
Published 2017-03-01“…According to the accounting results, two optimization criteria, namely cost minimization and benefit maximization, were employed to screen for the most cost effective measures. …”
Get full text
Article -
1270
Two-stage resilience enhancement method for integrated electricity-gas systems through linepack and mobile compressors
Published 2025-07-01“…The progressive hedging algorithm is employed to further improve the solution efficiency. …”
Get full text
Article -
1271
Shoulder–Elbow Joint Angle Prediction Using COANN with Multi-Source Information Integration
Published 2025-05-01“…To address the precision challenges in upper-limb joint motion prediction, this study proposes a novel artificial neural network (COANN) enhanced by the Cheetah Optimization Algorithm (COA). The model integrates surface electromyography (sEMG) signals with joint angle data through multi-source information fusion, effectively resolving the local optima issue in neural network training and improving the accuracy limitations of single sEMG predictions. …”
Get full text
Article -
1272
Statistics and behavior of clinically significant extra-pulmonary vein atrial fibrillation sources: machine-learning-enhanced electrographic flow mapping in persistent atrial fibri...
Published 2025-08-01“…These findings, supported by the FLOW-AF trial, underscore the usefulness of clinical outcome-based machine learning to improve the efficacy of algorithm based medical diagnostics.…”
Get full text
Article -
1273
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
1274
Bayesian Uncertainty Quantification of Reflooding Model With PSO–Kriging and PCA Approach
Published 2025-01-01“…As reflooding is a vital stage to cool the core and prevent serious accidents and uncertainties exist in the important results of the program because of the complexity of the phenomena, IUQ is performed for reflooding models in this study based on Bayesian theory and Markov chain Monte Carlo (MCMC) algorithm. In order to solve the problem of large time costs in sampling and inefficient use of transient sample points, particle swarm optimization (PSO)–Kriging model and principal component analysis (PCA) are adopted in this paper. …”
Get full text
Article -
1275
Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding
Published 2014-01-01“…The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. …”
Get full text
Article -
1276
Well logging super-resolution based on fractal interpolation enhanced by BiLSTM-AMPSO
Published 2025-05-01“…Specifically, mutation factors are introduced into the particle swarm optimization (PSO) algorithm to enhance search accuracy. …”
Get full text
Article -
1277
Advanced Load Balancing Based on Network Flow Approach in LTE-A Heterogeneous Network
Published 2014-01-01Get full text
Article -
1278
Classification-based point cloud denoising and 3D reconstruction of roadways
Published 2025-05-01“…By integrating a mean value method, an improved density-based spatial clustering of applications with noise (DBSCAN) algorithm, and an improved bilateral filtering algorithm, this study constructed a technical framework for classification processing. …”
Get full text
Article -
1279
Hybridized Deep Learning Model for Perfobond Rib Shear Strength Connector Prediction
Published 2021-01-01“…In the second scenario, a comparable AI model hybridized with genetic algorithm (GA) as a robust bioinspired optimization approach for optimizing the related predictors for the PRSC is proposed. …”
Get full text
Article -
1280
An Adaptive Unscented Kalman Ilter Integrated Navigation Method Based on the Maximum Versoria Criterion for INS/GNSS Systems
Published 2025-05-01“…On this basis, fully considering the high-order moments of estimation errors, the maximum versoria criterion is introduced as the optimization criterion to construct a novel cost function, further effectively suppressing deviations caused by non-Gaussian disturbances and improving system navigation accuracy. …”
Get full text
Article