-
3881
Application of data twinning based on deep time series model in smart city traffic flow prediction
Published 2025-05-01Get full text
Article -
3882
Rapid calculation scheme for electricity quantity and green certificate allocation considering demand response within the municipal scope
Published 2025-05-01“…This paper focuses on the day-ahead allocation scenario of electricity quantity and certificates considering demand response within the municipal scope, constructs a leader-follower game model, and solves it through the Kriging model surrogate optimization method. Compared with direct solution methods, this algorithm can reduce computational requirements, improve calculation speed, and achieve precise allocation of electricity quantity and certificates among different regions with corresponding green certificate proportions. …”
Get full text
Article -
3883
Stegan detection method for latent images for intellectual property protection systems
Published 2023-02-01“…The method is based on the use of the VGG16 convolutional neural network model, in which the architecture and training parameters are optimized. Result. Increasing the accuracy of detecting stegocontainer images by 3.8%, as well as the possibility of using the algorithm of the developed method for images with a higher resolution than the dimension of the input of an artificial neural network. …”
Get full text
Article -
3884
Efficient automated detection of power quality disturbances using nonsubsampled contourlet transform & PCA-SVM
Published 2025-05-01“…Morphological component analysis (MCA) and the split-augmented Lagrangian shrinkage algorithm (SALSA) optimize this process. Principal component analysis (PCA) is applied to the extracted features to reduce dimensionality and improve feature separability. …”
Get full text
Article -
3885
Heuristic Binary Search for Modulated Predictive Control
Published 2025-01-01“…Predictive Control optimization often relies on exhaustive enumeration of voltage vectors within the finite control set. …”
Get full text
Article -
3886
Full lifecycle security management scheme for terminal keys under power IoT
Published 2025-01-01“…The performance analysis shows that compared to the traditional access authentication and key management scheme based on logical key hierarchy, the scheme of this paper optimizes the terminal computation, reduces the computational overhead and simplifies the key update process. …”
Get full text
Article -
3887
Dynamic characteristics study of composite base plate: numerical simulation, processing technology research and modal analysis
Published 2025-07-01“…The subspace method serves as the solution algorithm for the eigenvalue problem, which enables the computation of the modes of the composite base plate. …”
Get full text
Article -
3888
Last-Train Timetabling under Transfer Demand Uncertainty: Mean-Variance Model and Heuristic Solution
Published 2017-01-01“…Through computational experiments involving the Beijing subway system, we demonstrate the computational efficiency of the proposed MV model and the heuristic approach.…”
Get full text
Article -
3889
Invariant set theory for predicting potential failure of antibiotic cycling
Published 2025-09-01“…Consequently, we propose a computational algorithm to identify effective sequential therapies to counter antibiotic resistance. …”
Get full text
Article -
3890
Fuzzy incidence coloring under structural operations for communication channel allocation
Published 2025-08-01“…To this end, we propose a dedicated algorithm, which is designed to efficiently compute the FICN of SP graphs. …”
Get full text
Article -
3891
Complex Neutrosophic Approach for Uncertainty Management in Employment Competence for Higher Vocational College Students
Published 2025-05-01“…In this work, we propose a multi-criteria complex neutrosophic approach integrating for optimization and uncertainty management of vocational student employment. …”
Get full text
Article -
3892
Adaptive sequential sampling for reliability estimation of binary functions
Published 2022-08-01“…Two basic tasks are identified: (i) extension of the experimental design (ED) and (ii) estimation of probabilities. The new extension algorithm adds points for limit state evaluation to the ED by balancing the global exploration and local exploitation, and the estimation uses the pointwise information to build a simple surrogate and perform a novel optimized importance sampling. …”
Get full text
Article -
3893
-
3894
GeoAT: Geometry-Aware Attention Feature Matching Network
Published 2025-01-01“…In the future, GeoAT will focus on further optimizing computational efficiency and enhancing robustness.…”
Get full text
Article -
3895
-
3896
Coordinated Jamming and Poisoning Attack Detection and Mitigation in Wireless Federated Learning Networks
Published 2025-01-01Get full text
Article -
3897
Machine learning-driven multi-targeted drug discovery in colon cancer using biomarker signatures
Published 2025-08-01“…Abstract Computational oncology advances multi-targeted therapies for Colon Cancer (CC) by leveraging molecular data and identifying potential drug candidates. …”
Get full text
Article -
3898
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…In light of the shortcomings pertaining to UAV small target detection, the detection of complex scenes, and the detection of multi-scale targets, a time-frequency dual-domain feature extraction algorithm, TF-DETR, has been proposed. This algorithm has been optimized for RT-DETR.Firstly, a time-frequency domain feature extraction module, TF-CSPNet, has been introduced into the backbone network. …”
Get full text
Article -
3899
-
3900
Fault prediction of smart meter based on spatio-temporal convolution neural network
Published 2022-03-01Get full text
Article