-
821
Quantum Edge Detection and Convolution Using Paired Transform-Based Image Representation
Published 2025-03-01Get full text
Article -
822
A survey on deep learning in UAV imagery for precision agriculture and wild flora monitoring: Datasets, models and challenges
Published 2024-12-01“…For these reasons, research literature is rich of works that face problems in Precision Agriculture and Wild Flora Monitoring domains with machine learning/computer vision methods applied to UAV imagery. …”
Get full text
Article -
823
Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks
Published 2020-03-01“…Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. …”
Get full text
Article -
824
-
825
Integrating Advanced Techniques: RFE-SVM Feature Engineering and Nelder-Mead Optimized XGBoost for Accurate Lung Cancer Prediction
Published 2025-01-01“…However, medical datasets often face challenges like irrelevant features and class imbalance, complicating accurate predictions. …”
Get full text
Article -
826
Review of the Research on Underwater Explosion Ice-Breaking Technology
Published 2025-07-01“…However, significant limitations persist in modeling sea ice heterogeneity, experimental replication of polar conditions, and computational efficiency. Future advancements require multiscale fluid–structure interaction models integrating brine migration effects, enhanced experimental diagnostics for transient processes, and optimized numerical algorithms to enable reliable predictions for engineering applications.…”
Get full text
Article -
827
-
828
-
829
Inverse-design topology optimization of magnonic devices using level-set method
Published 2025-05-01“…While promising for analog, Boolean, and neuromorphic computing, current implementations face memory limitations that hinder the design of complex systems. …”
Get full text
Article -
830
Reliability-Based Topology Optimization Considering Overhang Constraints for Additive Manufacturing Design
Published 2025-06-01“…AM offers intricate component production but faces challenges due to support structures. Incorporating overhang constraints in topology optimization enables self-supporting structures. …”
Get full text
Article -
831
Machine Learning‐Enhanced Optimization for High‐Throughput Precision in Cellular Droplet Bioprinting
Published 2025-05-01“…In this study, a high‐throughput cellular droplet bioprinter is designed, capable of printing over 50 cellular droplets simultaneously, producing the large dataset required for effective machine learning training. Among the five algorithms evaluated, the multilayer perceptron model demonstrates the highest prediction accuracy, while the decision tree model offers the fastest computation time. …”
Get full text
Article -
832
A novel hybrid fuzzy logic and federated learning framework for enhancing cybersecurity and fraud detection in IoT-enabled metaverse transactions
Published 2025-06-01“…The optimized federated learning model for IoT devices implements lightweight algorithms with hierarchical aggregation that reduce computational and communication overhead to enhance fraud detection capabilities. …”
Get full text
Article -
833
Optimizing frequency stability with adaptive fast frequency reserves and Wide-Area Monitoring Systems
Published 2025-10-01“…The Nordic 44 power system model is used with OPAL-RT for real-time simulation, Real-Time Automation Controller (RTAC), and protective relays to monitor, automate, protect, and control the system. The adaptive algorithm computes the frequency deviation, adjusts the control gain in real time, and recalculates the FFR activation thresholds and volumes accordingly. …”
Get full text
Article -
834
-
835
Data-Efficient Reinforcement Learning Framework for Autonomous Flight Based on Real-World Flight Data
Published 2025-03-01Get full text
Article -
836
Blockchain Technology in Supply Chain Management Prospects and Challenges for Implementation
Published 2025-01-01“…Existing implementations are facing significant challenges, such as considerable computational expense, scalability constraints, issues with interoperability, energy waste, and regulatory compliance. …”
Get full text
Article -
837
A Design of Irregular Grid Map for Large-Scale Wi-Fi LAN Fingerprint Positioning Systems
Published 2014-01-01“…Because of the millions of APs in urban areas, radio fingerprints are seriously contaminated and confused. Moreover, the algorithmic advances for positioning face computational limitation. …”
Get full text
Article -
838
GAT-APG: Graph Attention Network-Based Attack Path Generation for Security Simulation
Published 2025-01-01“…Existing attack path generation methods face limitations in dynamic simulation environments due to their reliance on static network models and computational inefficiencies when network configurations change frequently. …”
Get full text
Article -
839
-
840
Blockchain based solution for secure information sharing in pharma supply chain management
Published 2024-11-01“…The registration phase computes the identification number upon the hashed private key along with the Edwards-curve digital signature algorithm (EdDSA) for all the stakeholders. …”
Get full text
Article