Suggested Topics within your search.
Suggested Topics within your search.
-
23501
Multimodal Deep Learning for Android Malware Classification
Published 2025-02-01“…DenseNet-GIN achieves 90.6% accuracy, with no further improvement obtained by expanding this ensemble to four models. …”
Get full text
Article -
23502
Bridging Community Engagement and Technological Innovation for Creating Smart and Resilient Cities: A Systematic Literature Review
Published 2024-12-01“…Moreover, the review highlights the significance of the use of smart technologies in improving urban resilience, including but not limited to real-time data-sharing platforms and ML algorithms. …”
Get full text
Article -
23503
Automated Edge Detection for Cultural Heritage Conservation: Comparative Evaluation of Classical and Deep Learning Methods on Artworks Affected by Natural Disaster Damage
Published 2025-07-01“…These findings suggest that automated edge detection can support conservation efforts by streamlining condition assessments and improving documentation.…”
Get full text
Article -
23504
Transductive Radar Clutter Segmentation Network for Ionospheric Inhomogeneity Clutter Suppression
Published 2025-01-01“…Experiments demonstrate the effectiveness of TRCS-Net in improving clutter suppression performance compared to individual algorithms, leveraging transductive transfer learning and simulation data.…”
Get full text
Article -
23505
Applying Remote Sensing, Sensors, and Computational Techniques to Sustainable Agriculture: From Grain Production to Post-Harvest
Published 2024-01-01“…The availability of sensors capable of detecting electromagnetic energy and/or heat emitted by targets improves the pre-harvest process and therefore becomes an indispensable tool in the post-harvest phase. …”
Get full text
Article -
23506
Energy Optimisation of Industrial Limestone Grinding Using ANN
Published 2025-07-01“…The results demonstrate significant improvements in energy efficiency, with energy savings reaching up to 48% in selected cases. …”
Get full text
Article -
23507
Innovative approaches to optimizing the road safety monitoring system
Published 2024-01-01“…The article presents a statistical analysis of innovative approaches to optimizing the system for monitoring the level of accidents and social risk, which is aimed at improving the predictive capabilities of the existing system for monitoring road safety indicators on the State Traffic Safety Inspectorate website. …”
Get full text
Article -
23508
A Novel Approximation Method for Solving Ordinary Differential Equations Using the Representation of Ball Curves
Published 2025-01-01“…The numerical results indicate that the proposed method improves error accuracy compared to existing studies, including those employing Bézier curves and the steepest descent method.…”
Get full text
Article -
23509
Artificial intelligence in prostate cancer
Published 2025-08-01“…Early diagnosis, personalized treatment, and prognosis prediction of PCa play a crucial role in improving patients’ survival rates. The advancement of artificial intelligence (AI), particularly the utilization of deep learning (DL) algorithms, has brought about substantial progress in assisting the diagnosis, treatment, and prognosis prediction of PCa. …”
Get full text
Article -
23510
Siamese comparative transformer-based network for unsupervised landmark detection.
Published 2024-01-01“…Current landmark detection algorithms often train a sophisticated image pose encoder by reconstructing the source image to identify landmarks. …”
Get full text
Article -
23511
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
23512
The role of research tasks in teaching physics
Published 2020-03-01“…Algorithms and necessary instructions are used to calculate the tasks. …”
Get full text
Article -
23513
Dual-Stage Gated Segmented Multimodal Emotion Recognition Method—***<sup>1</sup> , ***<sup>1</sup> , ***<sup>2 </sup>, ***<sup>1</sup>
Published 2025-01-01“…The interaction stage leverages the OAGL fusion strategy to model global-local cross-modal interactions, improving the efficiency of feature fusion. The dual-stage gating stage integrates local and global features to fully utilize emotional information. …”
Get full text
Article -
23514
Analytical and Geometric Foundations and Modern Applications of Kinetic Equations and Optimal Transport
Published 2025-05-01“…Centered around the Boltzmann and Fokker–Planck equations, we derive sharp exponential convergence estimates under minimal regularity assumptions, improving on prior methods by incorporating Wasserstein gradient flow techniques. …”
Get full text
Article -
23515
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01“…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
Get full text
Article -
23516
Uncertainty quantification with graph neural networks for efficient molecular design
Published 2025-04-01“…Using benchmarks from the Tartarus and GuacaMol platforms, our results show that UQ integration via probabilistic improvement optimization (PIO) enhances optimization success in most cases, supporting more reliable exploration of chemically diverse regions. …”
Get full text
Article -
23517
Ethical and legal considerations in healthcare AI: innovation and policy for safe and fair use
Published 2025-05-01“…Artificial intelligence (AI) is transforming healthcare by enhancing diagnostics, personalizing medicine and improving surgical precision. However, its integration into healthcare systems raises significant ethical and legal challenges. …”
Get full text
Article -
23518
Robust Bayesian Fluorescence Lifetime Estimation, Decay Model Selection and Instrument Response Determination for Low-Intensity FLIM Imaging.
Published 2016-01-01“…We present estimates of decay parameters for mono- and bi-exponential systems, offering up to a factor of two improvement in accuracy compared to previous popular techniques. …”
Get full text
Article -
23519
Exploring A Better Way to Constraint Propagation Using Naked Pair
Published 2025-01-01“…Sudoku is an NP-complete problem therefore developing various efficient algorithms is crucial. This paper presents an enhanced approach to solving sudoku puzzles by improving on recursive backtracking with constraint propagation and bitmask, focusing on the implementation of the naked pair technique. …”
Get full text
Article -
23520
Before hands disappear: Effect of early warning visual feedback method for hand tracking failures in virtual reality.
Published 2025-01-01“…However, current hand tracking algorithms are prone to errors, which can disrupt the user experience and hinder task performance. …”
Get full text
Article