-
981
Investigation of Effects of Thermal Radiation, Magnetic Field, Eckert Number, and Thermal Slip on MHD Hiemenz Flow by Optimal Homotopy Asymptotic Method
Published 2021-01-01“…Similarity variable conversion method has been applied to transmute the fundamental governing equations of the fluid dynamics in flow into a pair of nonlinear third-order ordinary differential equations and is analytically solved by the optimal homotopy asymptotic method (OHAM). …”
Get full text
Article -
982
The optimization path of agricultural industry structure and intelligent transformation by deep learning
Published 2024-11-01“…Subsequently, a hybrid optimization method is designed, combining the Genetic Algorithms with particle swarm optimization to improve the model’s global search capability and local convergence speed. …”
Get full text
Article -
983
Improving an endangered marine species distribution using reliable and localized environmental DNA detections combined with trawl captures
Published 2025-04-01“…Recent studies suggest that combining traditional capture methods and environmental DNA (eDNA) detections enhance rare species’ occurrence. …”
Get full text
Article -
984
-
985
Optimization of GC-MS Method for Analysis of Basil Essential Oils from Algeria: Design of Experiments and Exploratory Pattern Recognition
Published 2022-01-01“…This set of conditions was later used for the optimization of the final method. The optimal experimental conditions were subsequently obtained by response surface optimization (isotherm duration = 6.2 min and slope = 1.06°C/min). …”
Get full text
Article -
986
Node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network
Published 2019-08-01“…For this reason, a node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network is proposed in this article. …”
Get full text
Article -
987
-
988
Theoretical Study on Concentration Monitoring of Suspended Particles by Laser Scattering Method
Published 2018-06-01Get full text
Article -
989
OPTIMIZATION OF THE METHOD FOR OBTAINING NANOCAPSULES, DEVELOPMENT OF THE METHODS OF DETERMINING THE DEGREE OF CINNARIZINE INCLUSION IN A PROLONGED DOSAGE FORM BASED ON POLY-D, L-L...
Published 2019-07-01“…Validation assessment of the methods was carried out upon such indicators as specificity, linearity, detection limit, repeatability, reproducibility.Results. …”
Get full text
Article -
990
Optimization of Beamforming and Transmit Power Using DQN and Comparison With Traditional Techniques
Published 2025-01-01“…These technologies enhance wireless communication by leveraging deep neural networks and data-driven methods to optimize resource allocation, signal detection, and channel coding. …”
Get full text
Article -
991
Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles
Published 2024-10-01“…To efficiently counter new malware variants, novel techniques distinct from conventional methods must be utilized. Machine learning (ML) techniques cannot detect every new and complex malware variant. …”
Get full text
Article -
992
EEG-Based Emotion Detection Using Roberts Similarity and PSO Feature Selection
Published 2025-01-01“…Evaluation on an EEG brainwave dataset demonstrated that the method achieved an accuracy of 98.75% with feature selection, compared to 94.04% without it in emotional state detection. …”
Get full text
Article -
993
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…The ACAD-BMDL method mainly focuses on enhancing security in the CPS environment via the cyberattack detection process. …”
Get full text
Article -
994
-
995
Efficient sepsis detection using deep learning and residual convolutional networks
Published 2025-07-01“…In this article, we present a new deep learning model to detect the occurrence of sepsis and the African vulture optimization algorithm (AVOA) to enhance the model performance. …”
Get full text
Article -
996
Class-weighted Dempster–Shafer in dual-level fusion for multimodal fake real estate listings detection
Published 2025-05-01“…Furthermore, a new weighting scheme is introduced to optimize Dempster–Shafer in decision fusion to help the model achieve optimal performance and as a result, our method improves the classification. …”
Get full text
Article -
997
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01Get full text
Article -
998
Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
Published 2025-06-01“…Traditional detection methods often fall short in identifying multi-class attacks, particularly in the presence of high-dimensional and imbalanced IoT traffic. …”
Get full text
Article -
999
Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection
Published 2024-09-01“… Electricity theft is a significant challenge for utility companies worldwide, leading to substantial economic losses and inefficiencies in power distribution. Traditional methods of detecting electricity theft, such as manual inspections and routine audits, are often inefficient and ineffective. …”
Get full text
Article -
1000
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments
Published 2025-07-01“…Machine learning (ML) plays a crucial role in cybersecurity by making malware detection more scalable, efficient, and automated, reducing reliance on conventional human intervention methods. …”
Get full text
Article