-
2061
Application research of 3D virtual interactive technology in interactive teaching of arts and crafts
Published 2024-12-01“…For this reason, the research proposes an image denoising model based on convolutional neural network and wavelet transform, which adopts residual neural network structure and batch normalization algorithm, aiming at gradient explosion and gradient disappearance that may be caused by convolutional neural network, And the problem of low training efficiency has been optimized. …”
Get full text
Article -
2062
Assessing government grants: evidence from greenhouse tomato and pepper farmers in Kosovo
Published 2018-12-01“…Genetic matching with an evolutionary algorithm was applied to evaluate the impact of the Ministry of Agriculture, Forestry and Rural Development (MAFRD) grant programs to support greenhouse vegetable production in Kosovo. …”
Get full text
Article -
2063
On Optimal Antijamming Strategies in Sensor Networks
Published 2012-04-01“…A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. …”
Get full text
Article -
2064
Robust Adaptive Control for a Class of T-S Fuzzy Nonlinear Systems with Discontinuous Multiple Uncertainties and Abruptly Changing Actuator Faults
Published 2020-01-01“…Finally, a numerical example is provided to illustrate the effectiveness of the proposed control algorithm.…”
Get full text
Article -
2065
Consensus control of multiple electric springs considering non-critical load electricity fairness in islanded microgrid
Published 2025-07-01“…The electric spring (ES) is an effective means to mitigate these fluctuations. However, a single ES may not be sufficient to ensure voltage stability for each node or support system frequency regulation. …”
Get full text
Article -
2066
On improvements of multi-objective branch and bound
Published 2024-01-01“…Since bounding and pruning is considerably weaker in multiple objectives, many branches have to be (partially) searched and may not be pruned directly. The adaptive use of objective space information can guide the search in promising directions to determine a good approximation of the Pareto front already in early stages of the algorithm. …”
Get full text
Article -
2067
Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization
Published 2025-08-01“… In modern world, continuous data flows that may be analyzed in real-time and are created from multiple sources are referred to as data streams. …”
Get full text
Article -
2068
Multiple probabilistic traveling salesman problem in the coordination of drug transportation-In the context of sustainability goals and Industry 4.0.
Published 2021-01-01“…It should be stressed that this work may be of interest to researchers but also to management practitioners. …”
Get full text
Article -
2069
Prediction of the spatial distribution of vine weevil under climate change using multiple variable selection methods
Published 2025-03-01“…Climate change could shift its habitat northward, particularly in areas where it currently occurs, and human activities may help spread the pest to new regions. This study offers a potential distribution map to aid in monitoring and controlling the vine weevil, emphasizing the importance of variable selection methods in predictive modeling.…”
Get full text
Article -
2070
Application of Fuzzy Optimization to the Orienteering Problem
Published 2015-01-01“…To efficiently solve large instances of FOP, we also present a parallel algorithm on CREW PRAM model.…”
Get full text
Article -
2071
Unveiling the Hidden Menace: A Topic Modeling Analysis of Hijacked Medical Journals
Published 2024-07-01“…Conclusion: The academic world is faced with the third-generation of hijacked journals, and their detection may be more complex than common ones. The usage of artificial intelligence (AI) can be a powerful tool to deal with the phenomenon.…”
Get full text
Article -
2072
The poetry of senses: exploring semantic mediation in timbre-aroma correspondences
Published 2025-02-01“…This study expands on previous work regarding timbre-aroma correspondences by examining the semantic mediation hypothesis, according to which cross-modal correspondences may be partly explained by the existence of common semantic qualities. …”
Get full text
Article -
2073
Designing natural gesture interaction for archaeological data in immersive environments
Published 2017-05-01“…Datasheets and pictures, stratigraphic data and 3D models, time and space mixed together: these are only a few of the categories a researcher has to deal with. New technologies may be able to help in this process and trying to solve research related problems needs innovative solutions. …”
Get full text
Article -
2074
Tolerance Analysis of Antenna Array Pattern and Array Synthesis in the Presence of Excitation Errors
Published 2017-01-01“…The nonprobabilistic interval analysis algorithm is used for tolerance analysis of the nonideal uniform linear array in this work. …”
Get full text
Article -
2075
System to Assist the Driver During a Single Lane Change Maneuver, in the Conditions of Danger Arising from a Change in the Condition of the Road Surface
Published 2024-12-01“…An original control algorithm has been built. It is the driver assistance system with a double PID controller of the steering wheel angle. …”
Get full text
Article -
2076
The Minimum Spectral Radius of an Edge-Removed Network: A Hypercube Perspective
Published 2017-01-01“…The edges in each candidate are evenly distributed over the network, which may be a common feature of all symmetric networks and hence is instructive in designing effective heuristic algorithms for the SRMP.…”
Get full text
Article -
2077
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01“…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
Get full text
Article -
2078
Motion Transmissibility for Load Identification Based on Optimum Sensor Placement
Published 2019-01-01“…In such situations, it may be possible to estimate the imposed loads through a measurement of the system output response. …”
Get full text
Article -
2079
Integrating Order Splitting and Acceptance with Batch Delivery in Parallel Machine Scheduling
Published 2024-09-01“…By comprehensively considering these aspects, a multi-machine production model is constructed that incorporates transportation batch sequences and uses heuristic algorithms to solve the problem. Finally, designed case examples validate the effectiveness of the model and algorithm.…”
Get full text
Article -
2080
On PTV definition for glioblastoma based on fiber tracking of diffusion tensor imaging data.
Published 2020-01-01“…It depended strongly on the used tracking algorithm and the used tracking parameters whether a connection was observed. …”
Get full text
Article