-
1401
A KeyBERT-Enhanced Pipeline for Electronic Information Curriculum Knowledge Graphs: Design, Evaluation, and Ontology Alignment
Published 2025-07-01“…This paper proposes a KeyBERT-based method for constructing a knowledge graph of the electronic information curriculum system, aiming to enhance the structured representation and relational analysis of educational content. …”
Get full text
Article -
1402
A Novel Open Circuit Fault Diagnosis for a Modular Multilevel Converter with Modal Time-Frequency Diagram and FFT-CNN-BIGRU Attention
Published 2025-06-01“…To solve this problem, an intelligent diagnosis method is proposed to integrate the modal time–frequency diagram and FFT-CNN-BiGRU-Attention. …”
Get full text
Article -
1403
Research and application of a novel grey multivariable model in port scale prediction under the impact of Free Trade Zone
Published 2024-07-01“…First, fractional-order accumulative generation operation (AGO) is introduced, which integrates the policy impact effect. Second, the heuristic grey wolf optimization (GWO) algorithm is used to determine the optimal nonlinear parameters. …”
Get full text
Article -
1404
Machine learning enables legal risk assessment in internet healthcare using HIPAA data
Published 2025-08-01“…Each algorithm has its strengths and limitations depending on the specific legal risk assessment task. …”
Get full text
Article -
1405
-
1406
Application of time series database technology in coal mine safety monitoring system
Published 2025-08-01“…In the informationization construction of coal mine safety production, the real-time collection, storage, and analysis of massive time-series data is a key technical bottleneck that restricts the efficiency improvement of safety monitoring systems. …”
Get full text
Article -
1407
Identification and validation of genes related to stem cells and telomere maintenance mechanisms as biomarkers for breast cancer
Published 2025-07-01“…Biomarker candidates were identified using the least absolute shrinkage and selection operator (LASSO) algorithm, followed by pathway enrichment and immunological analyses. …”
Get full text
Article -
1408
STRATEGICITY AS A BASIC PRINCIPLE OF PROFESSIONAL AND PEDAGOGICAL ACTIVITY
Published 2020-12-01“…It was found that strategies for solving professional problems within pedagogical activities are divided into algorithmic and heuristic. The algorithmic strategy is based on a certain algorithm as a set of rules that provide a single correct solution. …”
Get full text
Article -
1409
Developing an environmental equity index for urban heat wave event
Published 2025-02-01“…A multi-source data integration approach and a synthetic population algorithm are used to construct a method to calculate environmental equity indices with 100∗100 m spatial resolution. …”
Get full text
Article -
1410
Data-driven predictive model of coal permeability based on microscopic fracture structure characterization
Published 2025-07-01“…This paper presents a novel integrated approach that leverages the intrinsic relationship between microscopic fracture structure and permeability to construct a predictive model for coal permeability. …”
Get full text
Article -
1411
Adaptive Neural Network Iterative Sliding Mode Course Tracking Control for Unmanned Surface Vessels
Published 2022-01-01“…The RBF neural network control technology and adaptive control technology are integrated into the control algorithm, and the iterative sliding mode heading tracking controller of the unmanned surface ship adaptive-neural network is designed. …”
Get full text
Article -
1412
A Hierarchical Reinforcement Learning Framework for Multi-Agent Cooperative Maneuver Interception in Dynamic Environments
Published 2025-06-01“…At the low level, an improved prioritized experience replay multi-agent deep deterministic policy gradient algorithm (PER-MADDPG) is designed, integrating curriculum learning and prioritized experience replay mechanisms to effectively enhance the interception success rate against complex maneuvering targets. …”
Get full text
Article -
1413
Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks
Published 2025-02-01“…Subsequently, the proposed DoS attack compensation algorithm and the dynamic event-triggered mechanism are integrated with the model-free adaptive iterative learning control algorithm to design a controller, which is further extended from fixed-topology systems to time-varying topology systems. …”
Get full text
Article -
1414
Node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network
Published 2019-08-01“…Based on the genetic algorithm, the particle swarm optimization algorithm which integrates the idea of simulated annealing is regarded as an important operator of the genetic algorithm, which can converge to the optimal solution quickly. …”
Get full text
Article -
1415
Adaptation of k-means to automated forecasting of poorly structured time series of economic dynamics
Published 2025-02-01“…We confirmed that use and integration of well-known clustering methods into the linear cellular automaton algorithm allows to identify patterns and improve the quality of the forecast. …”
Get full text
Article -
1416
Design of Instrumentation and Control Components of Power Distribution Systems
Published 2024-03-01“…Universal models and algorithms are required to implement processes in power components and identify their optimal parameters. …”
Get full text
Article -
1417
-
1418
Software and Hardware Control System for Implementing the Balance Error Scoring System
Published 2025-05-01“…The result of our scientific research was the development of software and hardware control system for the implementation of BESS based on the integration of hardware and data processing algorithms. …”
Get full text
Article -
1419
Building Surface Defect Detection Based on Improved YOLOv8
Published 2025-05-01“…To address these issues, an improved version of the You Only Look Once (YOLOv8) algorithm is proposed for building surface defect detection. …”
Get full text
Article -
1420
Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
Published 2025-04-01“…To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication, and secret construction phases. Our scheme integrates chaotic-based public key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm, and blockchain-based fog computing technologies to enhance both efficiency and scalability. …”
Get full text
Article