-
3281
An Extensive Analysis on Optimized 3D Watermarking Using Enhanced Clustering Techniques
Published 2024-01-01“…The embedded watermark is extracted with an NCC value close to 1 for all clustering algorithms, indicating high accuracy. …”
Get full text
Article -
3282
A Novel Adaptive Active Disturbance Rejection Control Strategy to Improve the Stability and Robustness for a Wind Turbine Using a Doubly Fed Induction Generator
Published 2020-01-01“…Due to the acoustic nature of wind and to ensure capturing maximum energy, a control strategy to extract the available maximum power from the wind turbine by using a maximum power point tracking (MPPT) algorithm is presented. Moreover, a pitch actuator system is used to control the blades’ pitch angle of the wind turbine in order to not exceed the wind turbine rated power value in case of strong wind speeds. …”
Get full text
Article -
3283
A fair and efficient two-step procedure for sugarcane properties prediction based on near-infrared spectra
Published 2025-08-01“…In the initial phase of a breeding program, researchers might focus on classifying individuals as selected or not based on whether they display a property value above or below a specific threshold. Integrating classification methods with near-infrared (NIR) spectroscopy is essential for effective selection. …”
Get full text
Article -
3284
Solving Action Semantic Conflict in Physically Heterogeneous Multi-Agent Reinforcement Learning with Generalized Action-Prediction Optimization
Published 2025-02-01“…Second, in order to further improve cooperation between heterogeneous groups, we propose a Cross-Group Prediction (CGP) loss, which adaptively predicts the action policies of other groups by leveraging trajectory information. We integrate the GAPO into both value-based and policy-based MARL algorithms, giving rise to two practical algorithms: G-QMIX and G-MAPPO. …”
Get full text
Article -
3285
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
Published 2025-08-01“…This ensures the security and integrity of multi-party communication in quantum-threat environments. …”
Get full text
Article -
3286
Early Remaining Useful Life Prediction for Lithium-Ion Batteries Using a Gaussian Process Regression Model Based on Degradation Pattern Recognition
Published 2025-06-01“…The model hyperparameters are further optimized through the particle swarm optimization (PSO) algorithm to improve the adaptability and generalization capability of the predictive models. …”
Get full text
Article -
3287
Validation Framework for Analyzing Complex Anatomical Structures: Application of L-System Models
Published 2025-01-01“…It also highlights the value of synthetic models in verifying algorithm integrity, offering a solid foundation for future research on the analysis of complex anatomical structures.…”
Get full text
Article -
3288
Restoration of Hardware Function of Spectral Colorimeters Using Regularization Methods
Published 2021-12-01“…The estimation of the matrix operator of the hardware function is proposed to be obtained on the basis of explicit least squares estimation algorithms. The expediency of choosing a value of the regularization parameter that minimizes the accepted characteristic of the accuracy of the solution is indicated.…”
Get full text
Article -
3289
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…EdgeGuard outperforms existing solutions in terms of computational performance, data value, and privacy protection across a wide range of real-world medical datasets. …”
Get full text
Article -
3290
Using the proximal policy optimization and prospect theory to train a decision-making model for managing personal finances
Published 2024-11-01“…This article employs reinforcement learning techniques and behavioral economics to achieve this objective, thereby contributing to the advancement of practical algorithms and approaches for financial decision-making. …”
Get full text
Article -
3291
Heat Transfer by Transmission in a Zone with a Thermally Activated Building System: An Extension of the ISO 11855 Hourly Calculation Method. Measurement and Simulation
Published 2025-05-01“…The total heat transfer coefficient by transmission was measured and compared with the theoretical design value. Both proposed simulation algorithms provided results with very good accuracy. …”
Get full text
Article -
3292
In the New Multimedia Era, “Post-90s” Counselors Do a Good Job of Adaptive Education Path Research for “Post-00s” Freshmen
Published 2022-01-01“…The decision at this stage is particularly important for freshmen to successfully complete their studies and discover their own value. Therefore, in view of the situation that freshmen cannot adapt to the new environment as soon as possible after being separated from the familiar environment, we should guide students to establish a positive learning and life attitude in the university from multiple angles, all-round and multiple ways, and integrate into the new life as soon as possible. …”
Get full text
Article -
3293
DOPPLER SPECTRUM MATHEMATICAL MODEL OF SIGNAL SCATTERING FROM SEA SURFACE AT LOW GRAZING ANGLES
Published 2019-07-01“…The developed mathematical model is offered to use for the design of algorithm sea surface condition estimation and pollutant detection using the signal which received by radar.…”
Get full text
Article -
3294
Dual-branch graph Transformer for node classification
Published 2025-02-01“…Meanwhile, we designed a hybrid feature mechanism that integrated original features with GNN outputs and separately optimized the construction of the query ($ Q $), key ($ K $), and value ($ V $) matrices of the intracluster and intercluster Transformers in order to adapt to the different modeling requirements of two branches. …”
Get full text
Article -
3295
Real-time multi-level trust-based secure routing for improved QoS in WSN using blockchain
Published 2025-06-01“…The source node is involved in measuring LTF whereas an intermediate node would measure GTF value. Further, the method adapts the Adaptive Blockchain Security Algorithm for secure transmission of data between the nodes of the network. …”
Get full text
Article -
3296
Complexity-Constrained Quantum Thermodynamics
Published 2025-03-01“…Overall, our framework extends the resource-theoretic approach to thermodynamics to integrate a notion of time, as quantified by complexity.…”
Get full text
Article -
3297
Steel surface defect detection method based on improved YOLOv9
Published 2025-07-01“…The findings of this study hold significant practical value for improving the quality and efficiency of industrial products in the field of steel surface defect detection.…”
Get full text
Article -
3298
DESIGN AND FIELD TEST OF FUZZY PID CONTROL SYSTEM OF ACTIVE SUSPENSION FOR BLUEBERRY HARVESTER
Published 2025-03-01“…Subsequently, the virtual prototype model of the blueberry harvester (BH) was built in ADAMS with the nonlinear properties of the passive suspension. A fuzzy proportion integral differential (PID) control algorithm and decoupled control strategy were employed to design the AS control system. …”
Get full text
Article -
3299
INSTRUMENTAL AND BIOPHYSICAL METHOD OF EVALUATION TEST OF SEEDS OF GREEN VEGETABLE CULTURES
Published 2019-06-01“…The prospects of development of a method are specified. It is the integrated automatic analysis of quality of seeds. The algorithm of automatic computer X-ray analysis of quality of vegetable seeds is so far developed, the first version of the program is approved.…”
Get full text
Article -
3300
Topology Knapsack Problem for Geometry Optimization
Published 2025-01-01“…Moreover, the experiments compared the topology knapsack problem and the Louvain community detection algorithm using both datasets. The topology knapsack problem achieved better conductance values for each graph. …”
Get full text
Article