-
901
Designing Gridshells Using Reused Members as a Sustainable Solution
Published 2025-06-01Get full text
Article -
902
A Novel Six-Dimensional Chimp Optimization Algorithm—Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batt...
Published 2024-12-01“…The proposed 6DChOA-DRL algorithm optimizes RIS phase shifts to enhance the received power of IoT devices while mitigating interference from direct and RIS-cascaded links. …”
Get full text
Article -
903
Forecasting and decision making of firm’s financial indicators based on the SSA-MLP-BPNN model
Published 2025-12-01Get full text
Article -
904
Efficient design of non-restoring parity-preserving reversible divider
Published 2025-01-01“…Third, a parity-preserving reversible (n+1) bit shift register using the proposed reversible D-latch and other reversible gates is proposed. …”
Get full text
Article -
905
The Digital Era and the Evolution of Media Paradigms: A Critical Review of the Adaptation of Old Media in New Media Ecosystems
Published 2025-03-01“…Meanwhile, at the social practice level, there is a negotiation between traditional journalistic values and the increasingly dominant digital algorithmic logic in content management. The shift in media paradigms from linear, centralized communication models to participatory, modular, and decentralized many-to-many communication models has introduced new challenges, such as epistemic crises, misinformation, and digital platform dominance. …”
Get full text
Article -
906
Digital Legacies and Distressed Capacities
Published 2023-08-01“…They are considered ICT-GIS platforms and leverage spatial and information technologies to monitor public lands, pinpoint households with alphanumeric codes, and algorithmically approve construction projects on private lands. …”
Get full text
Article -
907
Improved chosen-plaintext power analysis attack against SM4 at the round-output
Published 2015-10-01“…The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However,the attack process was complex.There were many problems in the process,such as more power traces,more numbers of the chosen-plaintext and acquisition power traces.The correlation between the fixed data and the round key were presented,which could be used to decode the round key.Based on the correlation,the improved chosen-plaintext power analysis attack against SM4 at the round-output was proposed.The proposed method attacked the fixed data by analyzing the power traces of the special plaintext.And the round key was derived based on the correlation.The results show that the proposed attack algorithm is effective.The proposed method not only improves the efficiency of the attack by reducing number of power traces,number of the chosen-plaintext and number of acquisition power traces,but also can be applied to a chosen-plaintext power analysis attack against SM4 at the shift operation.…”
Get full text
Article -
908
Module Configuration of Rail Freight Transportation with Both Customer Segmentation and Product Family Genealogy in China
Published 2024-12-01“…The Chinese government is actively restructuring transportation to shift towards more sustainable rail freight transportation (RFT); however, there is still a lack of more systematic optimization in the whole production chain. …”
Get full text
Article -
909
The reform of the teaching mode of aesthetic education for university students based on digital media technology
Published 2025-07-01“…The students were first tracked by a combination of random forest algorithm and mean shift algorithm, and then the dynamic time warping algorithm was used for dynamic gesture recognition to ensure that students could move forward and backward through the gestures while using the simulation to navigate through the building. …”
Get full text
Article -
910
Improving frequency stability in grid-forming inverters with adaptive model predictive control and novel COA-jDE optimized reinforcement learning
Published 2025-05-01“…To resolve this, the AMPC framework combines offline reinforcement learning for parameter tuning with online MPC using soft constraints. The offline phase employs a novel Hybrid Crayfish Optimization and Self-Adaptive Differential Evolution Algorithm (COA-jDE) to minimize the cost function $$U_{offline}$$ , deriving optimal control parameters (Q, R) before real-time deployment. …”
Get full text
Article -
911
Mine cable partial discharge denoising method based on multivariate variational mode decomposition and improved wavelet threshold
Published 2025-04-01“…Finally, the exponential decay wavelet threshold function is constructed, which can quickly approximate the hard threshold function on the basis of overcoming the discontinuity of the hard threshold function and the constant deviation of the soft threshold function. The new improved wavelet threshold algorithm is used to denoise the partial discharge reconstruction signal, and the partial discharge denoising signal is obtained. …”
Get full text
Article -
912
Recovery of Implied Volatility in a Spatial-Fractional Black–Scholes Equation Under a Finite Moment Log Stable Model
Published 2025-08-01“…For the direct problem, we provide CN-WSGD (Crank–Nicholson and the weighted and shifted Grünwald difference) scheme to solve the initial boundary value problem. …”
Get full text
Article -
913
Intelligent Detection of Oceanic Front in Offshore China Using EEFD-Net with Remote Sensing Data
Published 2025-03-01Get full text
Article -
914
Extraction and analysis of aerosol anomalies associated with multiple shallow earthquakes based on MODIS AOD products
Published 2025-08-01“…This work utilizes MODIS AOD retrievals and a background field–based Robust Satellite Technique (RST) algorithm to detect AOD anomalies linked to 14 global shallow-focus earthquakes using a 2σ threshold, followed by statistical significance testing (p < 0.05). …”
Get full text
Article -
915
Advanced Frequency Analysis of Signals with High-Frequency Resolution
Published 2024-10-01“…This article mathematically and theoretically describes the modified frequency zoom algorithm in detail. The steps of the frequency zoom, from creating an analytical signal through frequency shifting and decimation to the frequency analysis of the signal, are realized. …”
Get full text
Article -
916
-
917
The philosophy of cognitive diversity: Rethinking ethical AI design through the lens of neurodiversity
Published 2025-12-01Get full text
Article -
918
-
919
-
920
A Multi-site Information Synchronization Scheme Based on Hankel Matrix Singular Value Decomposition
Published 2025-04-01“…[Methods] A multiplant information synchronization scheme based on the mutation detection algorithm is proposed. It compares the performance of typical outlier detection algorithms, such as the wavelet transform and singular value decomposition, in terms of pulse width, boundary effects, and phase-shift effects. …”
Get full text
Article