-
461
-
462
-
463
A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks
Published 2025-01-01“…Intrusion Detection Systems (IDS) face significant challenges in detecting cyber threats due to highly imbalanced datasets, high-dimensional feature spaces, and computational inefficiencies. …”
Get full text
Article -
464
An intelligent partial charging navigation strategy for electric vehicles
Published 2025-05-01“…Employing an improved genetic algorithm for route planning, our method demonstrates a dual advantage – reducing computational complexity and saving an average of 15% in travel time. …”
Get full text
Article -
465
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01“…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
Get full text
Article -
466
Prediction of old goaf residual subsidence integrating EDS-InSAR with EsLSTM in the Loess Plateau, China
Published 2025-01-01Get full text
Article -
467
Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts
Published 2025-07-01“…However, the demand for multi-party data joint analysis within these contracts faces challenges of privacy leakage and malicious deception. …”
Get full text
Article -
468
-
469
-
470
-
471
-
472
Les machines y voient-elles quelque chose ?
Published 2021-12-01“…Computer vision is one of AI’s most successful fields. …”
Get full text
Article -
473
Enhanced COVID-19 Optimization Algorithm for Solving Multi-Objective Optimal Power Flow Problems with Uncertain Renewable Energy Sources: A Case Study of the Iraqi High-Voltage Gri...
Published 2025-01-01“…Various optimization algorithms have been developed to address this issue. …”
Get full text
Article -
474
-
475
Evaluation method of e-government audit information based on big data analysis
Published 2025-12-01“…Furthermore, a parallel PSO-RF algorithm combining Particle Swarm Optimization (PSO) and Random Forest (RF) is designed to enhance classification performance and computational efficiency. …”
Get full text
Article -
476
Optimization of Composite Sandwich Structures: A Review
Published 2025-06-01“…Various optimization procedures, single- and multi-objective algorithms, Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), and Machine Learning (ML)-based optimization frameworks, as well as Finite Element (FE)-based numerical simulations, are discussed in detail. …”
Get full text
Article -
477
Optimizing Bifacial Solar Modules with Trackers: Advanced Temperature Prediction Through Symbolic Regression
Published 2025-04-01“…Accurate temperature prediction in bifacial photovoltaic (PV) modules is critical for optimizing solar energy systems. Conventional models face challenges to balance accuracy, interpretability, and computational efficiency. …”
Get full text
Article -
478
Survey of federated learning research
Published 2021-10-01“…Federated learning has rapidly become a research hotspot in the field of security machine learning in recent years because it can train the global optimal model collaboratively without the need for multiple data source aggregation.Firstly, the federated learning framework, algorithm principle and classification were summarized.Then, the main threats and challenges it faced, were analysed indepth the comparative analysis of typical research programs in the three directions of communication efficiency, privacy and security, trust and incentive mechanism was focused on, and their advantages and disadvantages were pointed out.Finally, Combined with application of edge computing, blockchain, 5G and other emerging technologies to federated learning, its future development prospects and research hotspots was prospected.…”
Get full text
Article -
479
A flare removal network for night vision perception: Resistant to the interference of complex light
Published 2024-10-01Get full text
Article -
480