-
2021
Predictive Study on the Cutting Energy Efficiency of Dredgers Based on Specific Cutting Energy
Published 2025-03-01“…Subsequently, five machine learning algorithms, such as RF and XGBoost, are used in combination with a grid search to find the optimal hyperparameters, and Lasso is used as the meta-learner to integrate the prediction results. …”
Get full text
Article -
2022
Multi-Objective Optimal Scheduling of Water Transmission and Distribution Channel Gate Groups Based on Machine Learning
Published 2025-06-01“…The NSGA-II multi-objective optimisation algorithm is used to minimise the water distribution error and the water level deviation before the gate as the objective function in order to achieve global optimisation of the regulation of the complex canal system. …”
Get full text
Article -
2023
A Novel High-Precision Workpiece Self-Positioning Method for Improving the Convergence Ratio of Optical Components in Magnetorheological Finishing
Published 2025-06-01“…Further, based on these thresholds, a hybrid self-positioning method combining machine vision and a probing module is proposed. A composite data acquisition method using both a camera and probe is designed, and a stepwise global optimization model is constructed by integrating a synchronous iterative localization algorithm with the Non-dominated Sorting Genetic Algorithm II (NSGA-II). …”
Get full text
Article -
2024
Pion pair production in e + e − annihilation at next-to-leading order matched to Parton Shower
Published 2025-05-01“…In order to contribute to an improved theoretical description and simulation of energy scan experiments, we present a calculation of the e + e − → π + π −(γ) hadronic channel at next-to-leading order matched to a Parton Shower algorithm in QED and sQED. According to the recent advances in the literature, particular attention is paid to the treatment of the pion composite structure in loop diagrams beyond the commonly used factorised sQED approach, as well as to the modelling of multiple photon radiation through the Parton Shower algorithm. …”
Get full text
Article -
2025
Big data and data science in global governance: anticipating future needs and applications in the UN and beyond
Published 2025-08-01“…We assess technical, ethical, and organizational challenges, including data quality inconsistencies, interoperability issues, privacy concerns, algorithmic bias, and resource constraints that impede the full integration of big data into governance systems. …”
Get full text
Article -
2026
Comparing Grid Model Fitting Methodologies for Low-temperature Atmospheres: Markov Chain Monte Carlo versus Random Forest Retrieval
Published 2025-01-01“…Here, we compare two grid model fitting approaches: a Markov Chain Monte Carlo (MCMC) algorithm interpolating across spectral fluxes, and a random forest retrieval (RFR) algorithm trained on a grid model set. …”
Get full text
Article -
2027
Optimization of Parameters of Two-Beam Laser Twelding of Quartz Raw Materials
Published 2023-01-01“…The optimization of two-beam laser cleaning of quartz raw materials was performed using the MOGA genetic algorithm in the ANSYS Work-bench program. Using the face-centered version of the central compositional plan of the experiment, a regression model of two-beam cleaning of quartz raw materials was obtained. …”
Get full text
Article -
2028
RESEARCH EMERGENCY TRANSIENTS IN POWER SYSTEMS 6 - 10 KV WITH THE THYRISTOR SWITCHES
Published 2022-05-01“…The conditions and the algorithms of thyristor switches to improve the reliability of power supply system 6 - 10 kV (SES) in emergency conditions: when power interruptions and short circuits (a short circuit). …”
Get full text
Article -
2029
How Cybersecurity Leadership Became the New Critical Managerial Competency in Healthcare Administration
Published 2025-07-01“…Ethical implications of increased digitalization in healthcare are addressed, including patient privacy concerns, data ownership issues, and potential algorithmic bias in AI-driven solutions. The study emphasizes the need for a balanced approach that leverages technological advancements while maintaining the human-centric nature of healthcare delivery. …”
Get full text
Article -
2030
A graphical modelling approach to the dissection of highly correlated transcription factor binding site profiles.
Published 2012-01-01“…Here, we develop a novel computational method, the Neighbourhood Consistent PC (NCPC) algorithms, which deal with these scenarios much more effectively than existing methods do. …”
Get full text
Article -
2031
Production monitoring and machine tracking in underground mines based on a collision avoidance system: A case study
Published 2025-07-01“…Consequently, the development of validation algorithms, including error correction and adaptive filtering, was imperative. …”
Get full text
Article -
2032
Defense strategies selection based on attack-defense evolutionary game model
Published 2017-01-01“…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
Get full text
Article -
2033
The phenomenon of digital paternalism as a factor in the transformation of state youth policy
Published 2025-06-01“…Its essential characteristics are highlighted: delegation of paternalistic functions to digital platforms, masking of state presence, adaptation to youth digital culture, and creation of an illusion of free choice. Based on the cooperation between government structures and the VKontakte social network, specific mechanisms for implementing the new model are identified: integration of state services into digital platforms, gamification of state initiatives, algorithmic promotion of content, and creation of «trendy» youth movements with state support. …”
Get full text
Article -
2034
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
Get full text
Article -
2035
Danger theory inspired intrusion detection model for wireless sensor networks
Published 2012-09-01“…According to the challenges of intrusion detection technique for wireless sensor networks,a danger theory in-spired intrusion detection model was proposed by taking advantage of the working principle of artificial immune system.Due to the distributed and cooperative mechanism,the proposed model shows more advantages in detection performance and energy consumption than methods adopt promiscuous to get global knowledge.The simulation results show that compared to traditional Watchdog algorithm with single threshold and self-nonself(SNS)model,the model inspired by danger theory can provide highest correct detection rate and lowest false detection rate.Moreover,the model can also decrease the energy consumption of the system.…”
Get full text
Article -
2036
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
Get full text
Article -
2037
METAL CHIP HEATING PROCESS INVESTIGATION (Part 3)
Published 2008-04-01“…The numerical solution algorithm of mathematical model of metal chip heating process in continuous muffle furnace and computer calculation program that allow to determine the heat- and mass transfer parameters have been worked out. …”
Get full text
Article -
2038
Artificial intelligence applied to the study of human milk and breastfeeding: a scoping review
Published 2024-12-01“…Observational and qualitative studies evaluating AI in the analysis of breastfeeding patterns and human milk composition have been conducted. A thematic analysis was employed to categorize and synthesize the data. …”
Get full text
Article -
2039
Advanced Ignition and Combustion Analysis of Second‐Generation Biodiesels in Turbocharged Diesel Engines
Published 2025-06-01Get full text
Article -
2040
A spike is a spike: On the universality of spike features in four epilepsy models
Published 2024-12-01“…This fact may be used for the development of universal algorithms for seizure detection applicable to different rat models of epilepsy. …”
Get full text
Article