-
461
Designing Gridshells Using Reused Members as a Sustainable Solution
Published 2025-06-01Get full text
Article -
462
A Novel Six-Dimensional Chimp Optimization Algorithm—Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batt...
Published 2024-12-01“…The proposed 6DChOA-DRL algorithm optimizes RIS phase shifts to enhance the received power of IoT devices while mitigating interference from direct and RIS-cascaded links. …”
Get full text
Article -
463
Efficient design of non-restoring parity-preserving reversible divider
Published 2025-01-01“…Third, a parity-preserving reversible (n+1) bit shift register using the proposed reversible D-latch and other reversible gates is proposed. …”
Get full text
Article -
464
The Digital Era and the Evolution of Media Paradigms: A Critical Review of the Adaptation of Old Media in New Media Ecosystems
Published 2025-03-01“…Meanwhile, at the social practice level, there is a negotiation between traditional journalistic values and the increasingly dominant digital algorithmic logic in content management. The shift in media paradigms from linear, centralized communication models to participatory, modular, and decentralized many-to-many communication models has introduced new challenges, such as epistemic crises, misinformation, and digital platform dominance. …”
Get full text
Article -
465
Digital Legacies and Distressed Capacities
Published 2023-08-01“…They are considered ICT-GIS platforms and leverage spatial and information technologies to monitor public lands, pinpoint households with alphanumeric codes, and algorithmically approve construction projects on private lands. …”
Get full text
Article -
466
Improved chosen-plaintext power analysis attack against SM4 at the round-output
Published 2015-10-01“…The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However,the attack process was complex.There were many problems in the process,such as more power traces,more numbers of the chosen-plaintext and acquisition power traces.The correlation between the fixed data and the round key were presented,which could be used to decode the round key.Based on the correlation,the improved chosen-plaintext power analysis attack against SM4 at the round-output was proposed.The proposed method attacked the fixed data by analyzing the power traces of the special plaintext.And the round key was derived based on the correlation.The results show that the proposed attack algorithm is effective.The proposed method not only improves the efficiency of the attack by reducing number of power traces,number of the chosen-plaintext and number of acquisition power traces,but also can be applied to a chosen-plaintext power analysis attack against SM4 at the shift operation.…”
Get full text
Article -
467
Module Configuration of Rail Freight Transportation with Both Customer Segmentation and Product Family Genealogy in China
Published 2024-12-01“…The Chinese government is actively restructuring transportation to shift towards more sustainable rail freight transportation (RFT); however, there is still a lack of more systematic optimization in the whole production chain. …”
Get full text
Article -
468
The reform of the teaching mode of aesthetic education for university students based on digital media technology
Published 2025-07-01“…The students were first tracked by a combination of random forest algorithm and mean shift algorithm, and then the dynamic time warping algorithm was used for dynamic gesture recognition to ensure that students could move forward and backward through the gestures while using the simulation to navigate through the building. …”
Get full text
Article -
469
Recovery of Implied Volatility in a Spatial-Fractional Black–Scholes Equation Under a Finite Moment Log Stable Model
Published 2025-08-01“…For the direct problem, we provide CN-WSGD (Crank–Nicholson and the weighted and shifted Grünwald difference) scheme to solve the initial boundary value problem. …”
Get full text
Article -
470
Improving frequency stability in grid-forming inverters with adaptive model predictive control and novel COA-jDE optimized reinforcement learning
Published 2025-05-01“…The offline phase employs a novel Hybrid Crayfish Optimization and Self-Adaptive Differential Evolution Algorithm (COA-jDE) to minimize the cost function $$U_{offline}$$ , deriving optimal control parameters (Q, R) before real-time deployment. …”
Get full text
Article -
471
Intelligent Detection of Oceanic Front in Offshore China Using EEFD-Net with Remote Sensing Data
Published 2025-03-01Get full text
Article -
472
Extraction and analysis of aerosol anomalies associated with multiple shallow earthquakes based on MODIS AOD products
Published 2025-08-01“…This work utilizes MODIS AOD retrievals and a background field–based Robust Satellite Technique (RST) algorithm to detect AOD anomalies linked to 14 global shallow-focus earthquakes using a 2σ threshold, followed by statistical significance testing (p < 0.05). …”
Get full text
Article -
473
Advanced Frequency Analysis of Signals with High-Frequency Resolution
Published 2024-10-01“…This article mathematically and theoretically describes the modified frequency zoom algorithm in detail. The steps of the frequency zoom, from creating an analytical signal through frequency shifting and decimation to the frequency analysis of the signal, are realized. …”
Get full text
Article -
474
-
475
The philosophy of cognitive diversity: Rethinking ethical AI design through the lens of neurodiversity
Published 2025-12-01Get full text
Article -
476
-
477
A Multi-site Information Synchronization Scheme Based on Hankel Matrix Singular Value Decomposition
Published 2025-04-01“…[Methods] A multiplant information synchronization scheme based on the mutation detection algorithm is proposed. It compares the performance of typical outlier detection algorithms, such as the wavelet transform and singular value decomposition, in terms of pulse width, boundary effects, and phase-shift effects. …”
Get full text
Article -
478
Research on Nonlinear Dynamic Characteristics of Fractional Order Resonant DC-DC Converter Based on Sigmoid Function
Published 2025-02-01“…Firstly, a Sigmoid function state model of the fractional order resonant converter is established and integrated with phase shift control. A discrete model of the converter is established by using an estimation correction algorithm. …”
Get full text
Article -
479
Leveraging Game Theory to Design Incentive-Compatible Time-Varying electricity pricing with Demand-Side management
Published 2024-10-01“…Additionally, the study acknowledges the potential for increased demand during off-peak hours due to load shifting. To address this, the influence of two optimization algorithms, Genetic Algorithm (GA) and Archimedes Optimization Algorithm (AOA), on user electricity bills and peak-to-average ratio following load scheduling is examined. …”
Get full text
Article -
480
Design Optimization and Performance Analysis of High Torque Density and Efficiency Motors for eVTOL Applications
Published 2025-01-01“…Additionally, the enhancement effects of Halbach magnets and a 30-degree phase shift arrangement on motor performance were examined. …”
Get full text
Article