-
13441
Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning
Published 2025-02-01“…The framework leverages the LazyPredict module to automatically select optimal supervised learning algorithms based on real-time network conditions and historical data. …”
Get full text
Article -
13442
Digital transformation of modern corporation management tools: the current state and development paths
Published 2022-03-01“…The authors distinguish three types of digital corporate governance: remote management (exercised by human individuals), smart management (based on algorithms designed by human engineers), and artificial intelligence (AI) management (that does not require human involvement). …”
Get full text
Article -
13443
Energy-Accuracy Trade-Offs for Resistive In-Memory Computing Architectures
Published 2024-01-01“…This result clearly implies the need for other approaches, e.g., algorithmic- and learning-based methods, to improve the inference accuracy of resistive IMC architectures.…”
Get full text
Article -
13444
Precision Weed Control Using Unmanned Aerial Vehicles and Robots: Assessing Feasibility, Bottlenecks, and Recommendations for Scaling
Published 2025-05-01“…Scaling requires advancements in weed detection and energy efficiency, development of affordable robots with shared service models, enhanced farmer training, improved rural connectivity, and precise engineering solutions. …”
Get full text
Article -
13445
AI in dermatology: a comprehensive review into skin cancer detection
Published 2024-12-01“…We analyzed and categorized the articles based on four key dimensions: advantages, difficulties, methodologies, and functionalities. Results AI-based models exhibit remarkable performance in skin cancer detection by leveraging advanced deep learning algorithms, image processing techniques, and feature extraction methods. …”
Get full text
Article -
13446
Aberrant gene expression prediction across human tissues
Published 2025-03-01“…Abstract Despite the frequent implication of aberrant gene expression in diseases, algorithms predicting aberrantly expressed genes of an individual are lacking. …”
Get full text
Article -
13447
Reward shaping-based deep reinforcement learning for look-ahead dispatch with rolling-horizon
Published 2025-07-01“…Case studies on the SG 126-bus and IEEE 118-bus systems demonstrate the effectiveness of the proposed improved measures, as well as the superiority and adaptability of the proposed improved DRL algorithms in training and testing performance.© 2017 Elsevier Inc. …”
Get full text
Article -
13448
Application of blade element momentum theory with guaranteed convergence to analyze a straight-blade horizontal axis wind turbine
Published 2025-06-01“…Straight-blade turbines with relatively large Re changes in blade spanwise direction often cause difficulties in the convergence of BEM algorithms. This article presents the ability to apply improved BEM theory to straight-blade wind turbines in the wind speed range from 5 to 7 m/s and tip speed ratio from 4 to 7 through analytical calculations. …”
Get full text
Article -
13449
The role of artificial intelligence in promoting health and developing preventive strategies for diabetes
Published 2025-03-01“…For instance, machine learning models can evaluate patient records, lifestyle factors, and genetic information to deliver precise risk assessments and personalized recommendations. …”
Get full text
Article -
13450
Edge-aware multisensor brain image fusion via guided filtering in Laplacian domain
Published 2025-07-01Get full text
Article -
13451
Application of machine deep learning technology in tight sandstones reservoir prediction: A case study of Xujiahe Formation in Xinchang, western Sichuan Depression
Published 2023-10-01“…Pre-stack inversion techniques were combined with machine deep learning algorithms to construct an interpretation model. This innovative method ultimately achieved quantitative predictions of sandstone thickness and reservoir properties. …”
Get full text
Article -
13452
Industrial-scale prediction of cement clinker phases using machine learning
Published 2025-05-01“…Abstract Cement production exceeds 4.1 billion tonnes annually, emitting 2.4 billion tonnes of CO2 annually, necessitating improved process control. Traditional models, limited to steady-state conditions, lack predictive accuracy for clinker mineralogical phases. …”
Get full text
Article -
13453
Collaborative altitude-adaptive reinforcement learning for active search with unmanned aerial vehicle swarms
Published 2024-09-01“…To address these challenges, collaborative altitude-adaptive reinforcement learning (CARL) was proposed which incorporated an altitude-aware sensor model, a confidence-informed assessment module, and an altitude-adaptive planner based on proximal policy optimization (PPO) algorithms. …”
Get full text
Article -
13454
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
13455
A mechanism for value-sensitive decision-making.
Published 2013-01-01“…Finally, cross-inhibition tunes the speed-accuracy trade-off realised when differences in the values of the alternatives are sufficiently large to matter. We propose that the model, and the significant role of the values of the alternatives, may describe other decision-making systems, including intracellular regulatory circuits, and simple neural circuits, and may provide guidance in the design of decision-making algorithms for artificial systems, particularly those functioning without centralised control.…”
Get full text
Article -
13456
Hardware-software complex for experimental research of electric drives of asynchronous motors with squirrel-cage rotor with traditional winding and motors with combined winding
Published 2022-04-01“…The structure of the HSC included the developed frequency converter with the possibility of adjusting the algorithms for controlling the electric motor and the mathematical model of the electric motor itself. …”
Get full text
Article -
13457
Travel Time Variability and Spatio-Temporal Analysis of Urban Streets Using Global Positioning System: A Review
Published 2025-01-01“…Different prediction models were developed to capture the main parameters related to travel time. …”
Get full text
Article -
13458
The Discriminants of Long and Short Duration Failures in Fulfillment Sortation Equipment: A Machine Learning Approach
Published 2023-01-01“…The gradient boosting classifier (GBC) produces state-of-the-art results in this setting, with precision of 0.76, recall of 0.82, and false positive rate (FPR) of 0.002. This model has since been applied successfully to automate the detection of long- and short-term defects, which has improved equipment maintenance schedules and personnel allocation towards fulfillment operations. …”
Get full text
Article -
13459
An investigation into the zoning of ecosystem sensitivity control areas in Mentougou District (Beijing, China).
Published 2024-01-01“…These values are processed through mathematical overlay algorithms, which generate composite results with different sensitivity levels. …”
Get full text
Article -
13460
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article