-
1281
A Novel Overload Control Algorithm for Distributed Control Systems to Enhance Reliability in Industrial Automation
Published 2025-05-01“…The proposed method is integrated with a modular multi-functional processor (MFP) architecture, designed to enhance system reliability, optimize resource utilization, and improve fault resilience under dynamic operational conditions. …”
Get full text
Article -
1282
A novel feature selection technique: Detection and classification of Android malware
Published 2025-03-01Get full text
Article -
1283
An ultrasonic-AI hybrid approach for predicting void defects in concrete-filled steel tubes via enhanced XGBoost with Bayesian optimization
Published 2025-07-01“…The method not only detects the presence of void defects but also quantifies their extent, advancing CFST inspection from qualitative analysis to quantitative assessment.…”
Get full text
Article -
1284
Mask-Space Optimized Transformer for Semantic Segmentation of Lithium Battery Surface Defect Images
Published 2024-11-01Get full text
Article -
1285
A Model Transformation Method Based on Simulink/Stateflow for Validation of UML Statechart Diagrams
Published 2025-02-01“…In the validation phase, the converted model is tested for robustness using the fault injection method, and boundary condition anomalies that are not explicitly stated in the requirement specification are successfully detected. …”
Get full text
Article -
1286
BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network
Published 2025-04-01“…It uses graph convolutional networks to detect changes in network topology, aiming to optimize data transmission delay and bandwidth occupancy within the network topology. …”
Get full text
Article -
1287
Experimental Study on the Dynamic Rock-Breaking Performance of Pulsed Abrasive Jet Drilling Method
Published 2020-01-01“…In this study, it is pointed out that developing high-efficiency drilling methods based on new combined water jets is a good approach to promote the rate of penetration (ROP) in such tight deep reservoirs. …”
Get full text
Article -
1288
Acceptance Threshold: A Bidimensional Research Method for User-Oriented Quality Evaluation Studies
Published 2008-01-01“…The first experiment examined the possibilities of using a simplified continuous assessment method for assessing overall acceptability. The second experiment explored the boundary between acceptable and unacceptable quality when the stimuli had clearly detectable differences. …”
Get full text
Article -
1289
Method to Use Transport Microsimulation Models to Create Synthetic Distributed Acoustic Sensing Datasets
Published 2025-05-01“…This research introduces a new method for creating synthetic Distributed Acoustic Sensing (DAS) datasets from transport microsimulation models. …”
Get full text
Article -
1290
Character-Level Adversarial Samples Generation Method Based on Dual-Layer Text Watermark
Published 2025-01-01“…Textual adversarial samples are widely used to assess the robustness and security of language models. Most existing methods generate these samples by substitution or deletion. …”
Get full text
Article -
1291
Quantification of paste homogeneity by vision-based identification method: Case study for an industrial mixer
Published 2025-03-01“…A collaborative end-cloud device captures real-time images of the mixer tail, formalizing homogeneity evaluation as a semantic image segmentation task. Our method detects non-paste and non-homogeneous areas, defining a non-homogeneity factor as their proportion to the paste area. …”
Get full text
Article -
1292
ASM-VoFDehaze: a real-time defogging method of zinc froth image
Published 2022-12-01“…Therefore, we propose a real-time defogging method based on ASM-VoFD (Atmospheric Scattering Model and the Variable-order Fractional Differential). …”
Get full text
Article -
1293
Multipath Suppression and High-precision Angle Measurement Method Based on Feature Game Preprocessing
Published 2025-04-01“…To solve this problem, this paper proposes a multipath suppression and high-precision angle measurement method. This method, based on a signal-level feature game approach, incorporates two interconnected components working together. …”
Get full text
Article -
1294
An improved method for whole-mount in situ hybridization in regenerating tails of Xenopus laevis tadpoles
Published 2024-12-01“…Whole-mount in situ hybridization (WISH) is a widely used method that supports the concept of “seeing is believing” by enabling the visualization of gene expression patterns in whole-mount multicellular samples or sections. …”
Get full text
Article -
1295
An AI recognition method for children's clinical operative pain by skin potential (SP) signal
Published 2025-01-01“…Method and results: This research established a pain recognition model based on AI skin potential (SP) signal analysis. …”
Get full text
Article -
1296
Assessment of Circulating Tumor Cells in Colorectal Cancer as an Adjunctive Non-invasive Diagnostic Method
Published 2024-01-01“…This study aimed to assess the diagnostic potential of CTC in CRC as an adjunctive diagnostic method using a subjective manual identification method and laser capture microdissection at 40x magnification. …”
Get full text
Article -
1297
FDIA Detection in Power Grid Based on Opposition-Based Whale Optimization Algorithm and Multi-layer Extreme Learning Machine
Published 2024-09-01“…Therefore, this paper proposes a FDIA location detection method based on opposition-based learning whale optimization algorithm and multi-layer extreme learning machine (OWOA-ELMML). …”
Get full text
Article -
1298
-
1299
Whale Optimization Algorithm-Enhanced Long Short-Term Memory Classifier with Novel Wrapped Feature Selection for Intrusion Detection
Published 2024-11-01“…This paper proposes a comprehensive intrusion detection method utilizing a novel wrapped feature selection approach combined with a long short-term memory classifier optimized with the whale optimization algorithm to address these challenges effectively. …”
Get full text
Article -
1300
Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing
Published 2025-01-01“…Besides, the pair barracuda swarm optimization (PBSO) method is employed to select features optimally. …”
Get full text
Article