-
1861
Aircraft Skin Machine Learning-Based Defect Detection and Size Estimation in Visual Inspections
Published 2024-09-01Get full text
Article -
1862
Study of Synergetic Optimization Operation for Distribution Network Considering Multiple Reactive Power Output Modes of Photovoltaics and Different Port Numbers of Flexible Interco...
Published 2025-03-01“…An optimization model with the aim of reducing voltage deviation, network loss, and the ratio of PV abandonment was constructed. Three algorithms were used for solving the multi-objective optimization model. …”
Get full text
Article -
1863
Multi-source data-driven Bayesian network for risk analysis of maritime accidents in the high sea
Published 2025-06-01“…Informed by a two-stage risk evolution theory, this approach integrates evidence from structured data, text analysis, and expert knowledge to construct a unified network structure, ensuring that derived causal relationships align with both statistical evidence and domain expertise. …”
Get full text
Article -
1864
An optimized ensemble model with advanced feature selection for network intrusion detection
Published 2024-11-01“…To address this challenge, our study presents the “Optimized Random Forest (Opt-Forest),” an innovative ensemble model that combines decision forest approaches with genetic algorithms (GAs) for enhanced intrusion detection. The genetic algorithms based decision forest construction offers notable benefits by traversing a wider exploration space and mitigating the risk of becoming stuck in local optima, resulting in the discovery of more accurate and compact decision trees. …”
Get full text
Article -
1865
Prediction and Optimization of Bolt Parameters for Automotive Fuel Cell Stack under Random Vibration
Published 2025-01-01“…By integrating XGBoost with a genetic algorithm (GA), a GA-XGBoost predictive model is developed to optimize the structural parameters of the fastening bolts. …”
Get full text
Article -
1866
Surface Roughness Prediction of Bearing Ring Precision Grinding Based on Feature Extraction
Published 2025-05-01“…Grinding, as the most crucial finishing process for bearing rings, influences the surface integrity of bearings through the roughness of the ground surface. …”
Get full text
Article -
1867
Population-Level Cell Trajectory Inference Based on Gaussian Distributions
Published 2024-11-01“…CPvGTI utilizes a Gaussian mixture model, optimized by the Expectation–Maximization algorithm, to construct new cell populations in the original data space. …”
Get full text
Article -
1868
Predictive analytics in gamified education: A hybrid model for identifying at-risk students
Published 2025-12-01“…This research proposes a hybrid predictive model designed to identify at-risk students within a gamified education environment accurately. By integrating logistic regression, decision trees, and random forests, we construct a robust ensemble model that leverages the strengths of each algorithm for precise risk assessment. …”
Get full text
Article -
1869
Detection and Optimization of Photovoltaic Arrays’ Tilt Angles Using Remote Sensing Data
Published 2025-03-01“…LiDAR data are used to construct a 2.5D grid to estimate the modules’ tilt (inclination) and aspect (orientation) angles. …”
Get full text
Article -
1870
Towards Intelligent Unmanned Adversarial Games: A Reinforcement Learning Framework with the PHP-ROW Method
Published 2025-04-01“…The superiority of the PHP-ROW method is showcased by contrasting it against the conventional proximal policy optimization (PPO) algorithm. Conclusively, the utility and efficacy of the presented framework are corroborated through human–machine adversarial game simulations in a hyper-realistic environment. …”
Get full text
Article -
1871
A trajectory planning and tracking method based on deep hierarchical reinforcement learning
Published 2025-06-01“…We design an upper-level decision model based on the trust region policy optimization algorithm integrated with long short-term memory to obtain more accurate strategies. …”
Get full text
Article -
1872
Improvement of Network Traffic Prediction in Beyond 5G Network using Sparse Decomposition and BiLSTM Neural Network
Published 2025-04-01“…Next, sparse feature extraction is performed using Discrete Wavelet Transform (DWT), and a sparse matrix is constructed. A Genetic Algorithm (GA) is used to optimize the sparse matrix, which effectively selects the most significant features for prediction. …”
Get full text
Article -
1873
Research on Civil Aviation Airport Site Selection Considering Group Consensus Level Under Large-Scale Uncertain Information
Published 2025-05-01“…The method comprises five key processes: (1) Evaluation process: Based on the constructed multicriteria evaluation system for airport site selection, the q-Rung Orthopair Fuzzy (q-ROF) information is employed to represent evaluations from large-scale decision makers, which effectively characterizes the uncertainty of information and broadens the evaluative scope. (2) Clustering process: A clustering procedure is designed for large-scale q-ROF evaluation data and weight information of criteria, identifying and removing outliers. (3) Consensus reaching process: Considering the characteristics of q-ROF evaluations and multiplicative preference relations, two adaptive consensus reaching algorithms are developed to enhance group consensus levels, thereby improving the rationality of decision-making results. (4) Weight determination process: Criteria and subcriteria weights are calculated using multiplicative preference weighting approach and a deviation maximization model, respectively, derived from aggregated group evaluations. (5) Ranking process: The q-ROF Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) method is applied, in conjunction with the induced q-ROF information integration paradigm, to comprehensively rank the alternative sites. …”
Get full text
Article -
1874
Transfer Kernel Extreme Learning Machine Based on Bidirectional Cross Domain Approximation
Published 2025-01-01“…Subsequently, these SDCDMAs are integrated with KELM to construct two transfer KELMs respectively. …”
Get full text
Article -
1875
Research on Self-Diagnosis and Self-Healing Technologies for Intelligent Fiber Optic Sensing Networks
Published 2025-03-01“…To address the issue of insufficient reliability of fiber optic sensing networks in complex environments, this study proposes a self-diagnosis and self-healing method based on intelligent algorithms. This method integrates redundant fiber paths and a fault detection mechanism, enabling rapid data transmission recovery through redundant paths during network faults, ensuring the stable operation of the monitoring system. …”
Get full text
Article -
1876
Node Classification Method Based on Hierarchical Hypergraph Neural Network
Published 2024-11-01“…The HCHG combines the high-order relationship-capturing capability of hypergraphs, uses the Louvain community detection algorithm to identify community structures within the network, and constructs hypergraphs layer by layer. …”
Get full text
Article -
1877
YOLO-HVS: Infrared Small Target Detection Inspired by the Human Visual System
Published 2025-07-01“…To address challenges of background interference and limited multi-scale feature extraction in infrared small target detection, this paper proposes a YOLO-HVS detection algorithm inspired by the human visual system. Based on YOLOv8, we design a multi-scale spatially enhanced attention module (MultiSEAM) using multi-branch depth-separable convolution to suppress background noise and enhance occluded targets, integrating local details and global context. …”
Get full text
Article -
1878
The numerical solution of the nonlinear boundary value problem with singularity for the system of delay integrodifferential-algebraic equations
Published 2019-06-01“…To find the value of the integral components of the problem, the trapezoid method was used. …”
Get full text
Article -
1879
An Adaptive Multi-Bernoulli Filter for Coexisting Point Target and Extended Target Tracking With Unknown Detection Probability
Published 2025-01-01“…Simulation results verify the effectiveness and robustness of the proposed algorithm.…”
Get full text
Article -
1880
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
Published 2025-08-01“…This ensures the security and integrity of multi-party communication in quantum-threat environments. …”
Get full text
Article