-
961
Application of expert systems in civil engineering
Published 2024-10-01“…Expert systems represent “IF-THEN” algorithms that integrate human expert knowledge to solve complex problems. …”
Get full text
Article -
962
Multimodal approaches and AI-driven innovations in dementia diagnosis: a systematic review
Published 2025-06-01Get full text
Article -
963
Data-driven ship trajectory tracking control method
Published 2025-02-01“…MethodA three degrees of freedom dynamics equation of a double propeller ship is constructed, and the extended state observer-multiple innovation recursive least squares interactive algorithm is designed by collecting the motion data of the ship. …”
Get full text
Article -
964
ORGANIZATIONAL RENEWAL IN THE STRUCTURE OF MANUFACTURING INDUSTRY IN THE REGION
Published 2022-05-01“…Presents an algorithm for constructing the cluster structure. Describes the process of clustering offood industry enterprises of the Stavropol territory…”
Get full text
Article -
965
Optimizing Aircraft Routes in Dynamic Conditions Utilizing Multi-Criteria Parameters
Published 2025-05-01“…A methodological solution is proposed to improve route construction algorithms, which involves taking into account variable parameters in real time and integrating them into modern navigation systems. …”
Get full text
Article -
966
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
967
-
968
Dynamic inverse piezo-effect problem for a long piezoceramic thermoelastic cylinder
Published 2021-01-01“…The developed calculation algorithm is used in the design of non-resonant and resonant piezoelectric measuring devices.…”
Get full text
Article -
969
-
970
Two-layer optimization model of distribution network line loss considering the uncertainty of new energy access
Published 2025-01-01“…Both layers are solved using the Improved Whale Optimization algorithm (IWOA). Then, the IEEE-33 node distribution system was taken as a simulation example to verify the effectiveness and superiority of the proposed model and algorithm.…”
Get full text
Article -
971
-
972
-
973
Immunogenic cell death genes in single-cell and transcriptome analyses perspectives from a prognostic model of cervical cancer
Published 2025-04-01“…Immunogenic cell death-related features (ICDRs) were constructed using multiple machine algorithms, and ICDRs were evaluated in training and validation sets to provide quantitative tools for predicting prognosis in clinical practice. …”
Get full text
Article -
974
Enhancing Compressive Strength Prediction in Recycled Aggregate Concrete through Robust Hybrid Machine Learning Approaches
Published 2025-03-01“…This investigation explores the integration of LSSVR with two innovative optimizers, namely the Giant Trevally Optimizer (GTO) and the Dingo Optimization Algorithm (DOA). …”
Get full text
Article -
975
Research on wheelchair form design based on Kansei engineering and GWO-BP neural network
Published 2025-03-01“…This study proposes a wheelchair form design method based on the Kansei engineering approach, which integrates the evaluation grid method (EGM), grey wolf optimization (GWO) algorithm, and back propagation neural network (BPNN) technology. …”
Get full text
Article -
976
Mental Concept of Professional Identification in Youth: Part IV
Published 2024-12-01“…The article introduces the initial psychological and economic conditions for a professional self-identification program for young people as the final component of the constructed mental concept. Interiorization is an internal mechanism and a psychological prerequisite that immanently represents the behavioral scheme of stimulus-response as an integral response in the form of cognitive, axiological, motivational, and behavioral patterns. …”
Article -
977
Fusion of MHSA and Boruta for key feature selection in power system transient angle stability
Published 2025-01-01“…A transient power angle stability key feature selection method that seamlessly integrates multi-head self-attention (MHSA) and the Boruta algorithm. …”
Get full text
Article -
978
Novel exosome-associated LncRNA model predicts colorectal cancer prognosis and drug response
Published 2025-05-01Get full text
Article -
979
-
980
Performance assessment of basalt fibre concrete under freeze-thaw cycles using hybrid long short-term memory models
Published 2025-12-01“…By integrating self-conducted experimental data and referenced datasets, a diverse experimental database was constructed. …”
Get full text
Article