-
1681
Multi-model MCDM framework for sustainable renewable energy selection in India: integrating CRITIC-EDAS-CODAS-CoCoSo
Published 2025-06-01“…Abstract The global boom in the importance of renewable energy (RE) resources has accelerated the transition from traditional energy sources to sustainable alternatives. Selecting an optimum RE power plant is a complex task influenced by geographical factors, climatic differences, and regional peculiarities. …”
Get full text
Article -
1682
Optimal Industrial Waste Management Strategy for Pakistan Steel Mill Corporation Using Complex Spherical Fuzzy Einstein Aggregation Information
Published 2025-01-01“…Applying greater generality in the dimensions of the abovementioned applications could potentially enhance a lot of their efficiency. Einstein norms/application of Einstein operations have not been effectively applied within the complex spherical fuzzy sets (CSFSs) framework as such; this study now advances the application of Einstein operators in CSFS which would provide an adiaphorous approach to solving issues related to decision-making problems (DMPs). …”
Get full text
Article -
1683
Identification of PET/CT radiomic signature for classification of locally recurrent rectal cancer: A network-based feature selection approach
Published 2025-01-01“…Identifying LRRC through imaging is complex, due to the mismatch between fibrosis and inflammatory pelvic tissue. …”
Get full text
Article -
1684
A novel sodium Iron silicate composite with chitosan for efficient removal of Cd(II) ions from water
Published 2025-05-01Get full text
Article -
1685
-
1686
-
1687
CD-STMamba: Toward Remote Sensing Image Change Detection With Spatio-Temporal Interaction Mamba Model
Published 2025-01-01“…Change detection (CD) is a critical Earth observation task. …”
Get full text
Article -
1688
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP.
Published 2025-01-01“…We propose to implement both MLP (Multilayer Perceptron) and CNN (Convolutional Neural Networks) based on conventional methods to detect the Denial of Services (DDoS) attack. These models have got a complex optimizer installed on them to decrease the false positive or DDoS case detection efficiency. …”
Get full text
Article -
1689
-
1690
A feature selection method utilizing path accumulation cost, redundancy minimization, and interaction maximization for the diagnosis of coronary heart disease
Published 2025-04-01“…Conclusion The proposed approach offers an efficient solution for early detection of CHD by identifying critical indicators, reducing diagnostic complexity, and improving predictive accuracy, thus potentially leading to more effective CHD management.…”
Get full text
Article -
1691
Detection of disease on nasal breath sound by new lightweight architecture: Using COVID-19 as an example
Published 2025-05-01“…Our Dense-ReLU-Dropout model, using RF and PCA for feature selection, achieves high accuracy with greater computational efficiency compared to existing methods that require more complex models or larger datasets. …”
Get full text
Article -
1692
Trade-offs between machine learning and deep learning for mental illness detection on social media
Published 2025-04-01“…Machine learning (ML) and deep learning (DL) models have been increasingly applied to classify mental health conditions from textual data, but selecting the most effective model involves trade-offs in accuracy, interpretability, and computational efficiency. …”
Get full text
Article -
1693
A novel approach to skin disease segmentation using a visual selective state spatial model with integrated spatial constraints
Published 2025-02-01“…To address limitations in existing approaches, we introduce a novel U-shaped segmentation architecture based on our Residual Space State Block. This efficient model, termed ‘SSR-UNet,’ leverages bidirectional scanning to capture both global and local features in image data, achieving strong performance with low computational complexity. …”
Get full text
Article -
1694
-
1695
Method on Efficient Operation of Multiple Models for Vision-Based In-Flight Risky Behavior Recognition in UAM Safety and Security
Published 2024-01-01“…It can effectively perform roles such as detecting prohibited items and recognition of dangerous/abnormal behavior. …”
Get full text
Article -
1696
-
1697
Detection of Stator Faults in Three-Phase Induction Motors Using Stray Flux and Machine Learning
Published 2025-03-01“…Despite advancements in non-invasive sensing, challenges remain in balancing fault detection accuracy, computational efficiency, and adaptability to real-world conditions. …”
Get full text
Article -
1698
A Lightweight Deep Learning Network with an Optimized Attention Module for Aluminum Surface Defect Detection
Published 2024-11-01“…Additionally, we introduced an optimized Convolutional Block Attention Module (CBAM) to further enhance network efficiency. Furthermore, we employed the genetic K-means algorithm to optimize prior region selection, and a lightweight Ghost model to reduce network complexity by 14.3%, demonstrating the superior performance of the Ghost model in terms of loss function optimization during training and validation as well as in terms of detection accuracy, speed, and stability. …”
Get full text
Article -
1699
Coverage, Throughput, and Energy Efficiency Enhancement in Beamspace Massive MIMO System Using Rate-Splitting and Orthogonal Precoding
Published 2024-01-01“…Following that, we offer an alternating method to solve the approximate optimization issue and select an optimal solution. Furthermore, we deduce an analytic expression for the downlink cell coverage percentage and evaluate the effectiveness of the suggested method in terms of total throughput, energy efficiency, and cell coverage percentage. …”
Get full text
Article -
1700
A method for detecting abnormal electricity prices at charging stations based on two rounds of clustering
Published 2025-01-01“…Due to the complexity of electricity pricing policies, multiple implementation steps, and difficulty in regulation, errors in electricity pricing implementation occur from time to time. …”
Get full text
Article