-
161
Decentralized Voltage Prediction in Multi-Area Distribution Systems: A Privacy-Preserving Collaborative Framework
Published 2025-01-01“…First, a privacy-preserving multi-objective XGBoost algorithm is developed to mitigate curious behavior through homomorphic encryption and minimal information sharing. …”
Get full text
Article -
162
Quantum Snowflake Algorithm (QSA): A Snowflake-Inspired, Quantum-Driven Metaheuristic for Large-Scale Continuous and Discrete Optimization with Application to the Traveling Salesma...
Published 2025-05-01“…The Quantum Snowflake Algorithm (QSA) is a novel metaheuristic for both continuous and discrete optimization problems, combining collision-based diversity, quantum-inspired tunneling, superposition-based partial solution sharing, and local refinement steps. …”
Get full text
Article -
163
Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering
Published 2024-06-01“…In the second stage, an interference clustering-based resource allocation (IC-RA) algorithm was proposed, and the interference matrix was constructed according to the interference relations among UE sharing the same subchannel. …”
Get full text
Article -
164
Algorithm for phase distribution in power supply systems of single-phase electric receivers according to the criterion of minimization of the coefficient of load ununiformity of th...
Published 2023-10-01“…The developed algorithm allowed producing brand-new engineering solutions while developing a design document for the power supply grid (design and detailed documentation stage). …”
Get full text
Article -
165
Improving Secrecy Capacity in the Face of Eavesdropping in SWIPT CIoT Networks With Actor-Critic DRL
Published 2025-01-01“…We formulate the challenging non-convex optimization problem to maximize secrecy capacity while ensuring spectrum sharing and energy constraints and model the CIoT agent’s decision-making as a model-free Markov decision process (MDP). …”
Get full text
Article -
166
Line-Frame Combined Multi-Slit Hyperspectral Imaging System for Simplified and High-Precision UAV Remote Sensing Solution
Published 2025-01-01“…At the same time, the system employs a multislit time-sharing sampling strategy to enable repeated spectral measurements while reducing sampling loss and maintaining data authenticity. …”
Get full text
Article -
167
TMEM132A: a novel susceptibility gene for lung adenocarcinoma combined with venous thromboembolism identified through comprehensive bioinformatic analysis
Published 2025-05-01“…This study utilized public databases to identify crosstalk genes (CGs) between LUAD and VTE, applied machine learning methods to discover shared diagnostic biomarkers, and explored their underlying mechanisms.MethodsDisease-specific genes for VTE were extracted from comprehensive genomic databases (CTD, DisGeNET, GeneCards, OMIM), while transcriptomic profiles of LUAD and VTE cohorts were retrieved from GEO via GEOquery implementation. …”
Get full text
Article -
168
Comprehensive Benefit Evaluation for Prefabricated Buildings Based on NSGA-II and Simulated Annealing Optimization Projection Pursuit Method
Published 2024-01-01“…Finally, the NSGA-II and simulated annealing algorithm optimization projection pursuit method are applied to solve and evaluate the comprehensive benefit model, obtaining the optimal prefabricated component solution with the best comprehensive benefits. …”
Get full text
Article -
169
Information Theoretic Analysis of PUF-Based Tamper Protection
Published 2025-03-01Get full text
Article -
170
-
171
Analyzing key users’ behavior trends in volunteer-based networks
Published 2025-05-01“…We utilized data from over 2.4 million users on a peer-to-peer food-sharing online platform. Using our algorithm, we identified four key user behavior patterns over time to evaluate our algorithms. …”
Get full text
Article -
172
A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication
Published 2025-06-01“…The scheme combines Grover’s algorithm with the decoy photon technique to ensure secure quantum transmission. …”
Get full text
Article -
173
Deep Learning Techniques for Early Fault Detection in Bearings: An Intelligent Approach
Published 2025-02-01“…Machine learning (ML) and deep learning (DL) algorithms have improved image processing, speech recognition, defect detection, item identification, and medical sciences. …”
Get full text
Article -
174
Selected Topics in Management and Modeling of Complex Systems: Editorial Introduction to Issue 16 of CSIMQ
Published 2018-10-01“…The range of topics ends with the discussion of specific algorithms that allow entity clustering for Big Data analysis. …”
Get full text
Article -
175
Integration of software-based cognitive approaches and brain-like computer machinery for efficient cognitive computing
Published 2025-06-01“…This transformation has enhanced the Internet's role in information dissemination, resource sharing, and global connectivity, allowing for more efficient distribution of knowledge and services. …”
Get full text
Article -
176
Efficacy and safety of an algorithm using C-reactive protein to guide antibiotic therapy applied through a digital clinical decision support system: a study protocol for a randomis...
Published 2025-01-01“…Strategies that use biomarkers to guide antimicrobial therapy—most notably Procalcitonin (PCT) and C-reactive protein (CRP)—show promise in safely reducing patient antibiotic exposure. While CRP is less studied, it offers advantages such as lower cost and broader availability compared with PCT.Methods and analysis This randomised clinical trial aims to evaluate a novel algorithm for non-critically ill adult patients. …”
Get full text
Article -
177
Digital twin enhanced agile design of ship pipeline systems [version 2; peer review: 1 approved, 3 approved with reservations]
Published 2025-01-01“…It predominantly relies on designers’ subjective experience, and it is marked by a lack of efficient knowledge sharing and the absence of smart pipe routing algorithms. …”
Get full text
Article -
178
Digital twin enhanced agile design of ship pipeline systems [version 1; peer review: 1 approved, 3 approved with reservations]
Published 2024-03-01“…It predominantly relies on designers’ subjective experience, and it is marked by a lack of efficient knowledge sharing and the absence of smart pipe routing algorithms. …”
Get full text
Article -
179
The ethics of data mining in healthcare: challenges, frameworks, and future directions
Published 2025-07-01“…Therefore, transparency must span three levels–dataset documentation, model interpretability, and post-deployment audit logging–to make algorithmic reasoning and failures traceable. Security vulnerabilities in the Internet of Medical Things (IoMT) and cloud-based health platforms amplify these risks, while corporate data-sharing deals complicate questions of data ownership and patient autonomy. …”
Get full text
Article -
180
Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply
Published 2018-09-01Get full text
Article