-
441
A Novel Tornado Detection Algorithm Based on XGBoost
Published 2025-01-01“…In addition, the TDA-XGB algorithm combines artificial intelligence-assisted learning to optimize the traditional algorithm based on the tornado vortex signature (TVS) and tornado debris signature (TDS), further improving the detection effect. …”
Get full text
Article -
442
Feature-based enhanced boosting algorithm for depression detection
Published 2025-07-01“…Thus, this study has developed a novel feature-based enhanced boosting algorithm (F-EBA). The proposed model covers two pipelines, the feature engineering pipeline which improves the quality of features by picking up the most relevant features while the classification pipeline uses an ensemble approach designed to boost/elevate the model’s performances. …”
Get full text
Article -
443
Optimizing Euclidean Distance Computation
Published 2024-11-01“…The Euclidean distance, being a computational bottleneck in large-scale optimization problems, requires efficient computation techniques to improve the performance of various distance-dependent algorithms. …”
Get full text
Article -
444
-
445
Algorithm for Selection Equipment to Reduce the Technogenic Effect on the Environment
Published 2022-03-01“…The proposed algorithm, in contrast to the approaches used in practice, was characterized by the work flexibility due to the possibility of supplementing and improving the databases of pollutants and equipment.…”
Get full text
Article -
446
Hybrid Raft-PoW Blockchain Consensus Algorithm
Published 2025-01-01“…The Raft consensus algorithm’s voting mechanism performs well in reliable and well-planned networks with optimized timeouts. …”
Get full text
Article -
447
Algorithms for Integrated Object Detection in Wireless Sensor Networks
Published 2025-05-01“…Wireless sensor networks can be used to solve various economic problems, including detection of objects (phenomena) of interest. Most of the well-known information processing algorithms in such networks are built according to a radial architecture. …”
Get full text
Article -
448
Using machine learning algorithms to predict colorectal polyps
Published 2025-02-01“…Background: Colorectal cancer (CRC) is the third most common cancer worldwide, and colorectal polyps (CRP) represent a necessary pathway to the development of CRC. …”
Get full text
Article -
449
Dynamic parking space allocation at urban scale: Problem formulation and resolution
Published 2022-11-01Get full text
Article -
450
Optimal Design of Integrating Two‐Level Artificial Intelligent With Three Degrees of Freedom‐PDF (TLNF‐3DOFPDF) Controller for AGC of Three‐Area Multi‐Sources Power System...
Published 2025-04-01“…Controller parameters are fine‐tuned using a novel metaheuristic method called the Skill Optimization Algorithm (SOA). The research assesses controller performance using multiple indices Integral of Time‐weighted Squared Error (ITSE), Integral of Squared Error (ISE), Integral of Time‐weighted Absolute Error (ITAE), and Integral of Absolute Error (IAE) and finds that ISE yields the most optimal results. …”
Get full text
Article -
451
The Application of PSO in Structural Damage Detection: An Analysis of the Previously Released Publications (2005–2020)
Published 2022-09-01“…Among different algorithms, the particle swarm optimization (PSO) approach has been of the most popular ones. …”
Get full text
Article -
452
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01“…Optimization of pharmacotherapy by prescribing drugs with fixed combinations can improve control of drug administration. …”
Get full text
Article -
453
Application of Artificial Intelligence Computer Intelligent Heuristic Search Algorithm
Published 2022-01-01“…After 231 iterations of particle swarm optimization algorithm, the optimal value is 6.83650785e-001. …”
Get full text
Article -
454
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
455
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
456
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
457
A Global Path Planning Algorithm Based on Bidirectional SVGA
Published 2017-01-01“…This algorithm does not construct a visibility graph before the path optimization. …”
Get full text
Article -
458
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
459
Implications of algorithmic bias in AI-driven emergency response systems
Published 2026-01-01“…Unlike existing research, which mostly addresses technical or ethical aspects in isolation, our approach integrates economic theory with algorithmic fairness to quantify and systematically analyze how biases in data quality and algorithm design impact resource allocation efficiency, response time equity, healthcare outcomes, and social welfare. …”
Get full text
Article -
460
Research on SBMPC Algorithm for Path Planning of Rescue and Detection Robot
Published 2020-01-01“…This research aims to improve autonomous navigation of coal mine rescue and detection robot, eliminate the danger for rescuers, and enhance the security of rescue work. …”
Get full text
Article