-
1681
F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs
Published 2017-07-01Get full text
Article -
1682
Regional partition based rapid prediction of power outages in distributed systems following flooding
Published 2025-09-01“…A genetic algorithm is then used to solve the size of the optimal simulation area, and ultimately determine the optimal simulation area. …”
Get full text
Article -
1683
-
1684
Grid Integration of PV Systems With Advanced Control and Machine Learning Strategies
Published 2025-01-01Get full text
Article -
1685
-
1686
Iterative Inversion of Normal and Lateral Resistivity Logs in Thin-Bedded Rock Formations of the Polish Carpathians
Published 2025-06-01“…The proposed iterative inversion procedure combines a finite element method forward modeling procedure with a particle swarm optimization algorithm to generate high-resolution models of the rock formation. …”
Get full text
Article -
1687
-
1688
Artificial liver classifier: a new alternative to conventional machine learning models
Published 2025-08-01Get full text
Article -
1689
Improving with Hybrid Feature Selection in Software Defect Prediction
Published 2024-04-01Get full text
Article -
1690
Advanced Leaf Classification Using Multi-Layer Perceptron for Smart Crop Management
Published 2025-01-01Get full text
Article -
1691
Optional and mandatory assignment strategies for dynamic vehicle routing with time windows
Published 2025-09-01“…In MPA, customer requests can be rejected if future requests are expected to be more advantageous, whereas MPM mandates accepting requests provided vehicle capacity is sufficient. After optimizing the methods through sensitivity analyses, we evaluated their performance against Clarke and Wright's Savings Algorithm (CW) across various real-world-inspired scenarios, including different time window lengths, interarrival times, and region types. …”
Get full text
Article -
1692
-
1693
Improving distributed systems failure prediction via multi-objective feature selection and deep forest
Published 2025-01-01Get full text
Article -
1694
-
1695
Evaluating the value of machine learning models for predicting hematoma expansion in acute spontaneous intracerebral hemorrhage based on CT imaging features of hematomas and surrou...
Published 2025-06-01“…Independent risk factors were identified through univariate analysis and least absolute shrinkage and selection operator (LASSO) regression. Machine learning algorithms were applied to construct predictive models for hematoma expansion. …”
Get full text
Article -
1696
Dynamic Adaptive Parametric Social Network Analysis Using Reinforcement Learning: A Case Study in Topic-Aware Influence Maximization
Published 2025-01-01“…Current network analysis algorithms often rely on search methods or centrality measures but face challenges such as 1) The solution space is large, resulting in high computational complexity. 2) Algorithms may be instance-dependent, relying considerably on network structure and characteristics, which may result in varying performance across different networks. 3) Most existing centrality measures are inherently static, which fail to capture the dynamic nature inherent in network analysis problems. …”
Get full text
Article -
1697
Multi-Domain Controversial Text Detection Based on a Machine Learning and Deep Learning Stacked Ensemble
Published 2025-05-01“…Furthermore, we systematically compare three hyperparameter optimization algorithms, including the sparrow search algorithm (SSA), particle swarm optimization (PSO), and Bayesian optimization (BO). …”
Get full text
Article -
1698
THE PROBLEM OF QUADRATIC PROGRAMMING IN DYNAMIC INPUT-OUTPUT BALANCE
Published 2022-05-01“…Therefore, this paper discusses a potential solution: a two-stage variant of the quadratic programming, which reduces the amount of computation. In addition, the article focuses on the deinition of quadratic programming algorithms, that provide a guaranteed result of optimization in a inite number of steps.…”
Get full text
Article -
1699
-
1700
Highly-Efficient Hardware Architecture for ML-KEM PQC Standard
Published 2025-01-01“…The advent of quantum computers, with their immense computational potential, poses significant threats to traditional cryptographic systems. …”
Get full text
Article