-
401
KAFA-Merge: Model Merging Method With Layer-Based Bayes+Linear Search
Published 2025-01-01“…In this paper, we consider the model merging process for large language models (LLMs) under a two-stage optimization framework. Traditional merging methods usually apply fixed blending rates to all layers, which ignores the different levels of contribution of layers to the output. …”
Get full text
Article -
402
Speed and Path Planning Optimization of Autonomous Vehicle to Minimize Lap Time in Racing Track
Published 2025-01-01“…This study proposes a trajectory optimization method for racing vehicles, aiming to maximize speed and path planning performance by estimating tire friction coefficients. …”
Get full text
Article -
403
-
404
Optimized methods for the targeted surveillance of extended-spectrum beta-lactamase-producing Escherichia coli in human stool
Published 2025-01-01“…Here, we compared different steps in the microbiological workflow to determine the impact different pre-enrichment broths, pre-enrichment incubation times, selection in pre-enrichment, selective plating, and DNA extraction methods had on recovering ESBL-EC from human stool samples, with the aim to acquire high-quality DNA for sequencing and genomic epidemiology. …”
Get full text
Article -
405
Optimal DMD Koopman Data-Driven Control of a Worm Robot
Published 2024-11-01“…The dynamic mode decomposition (DMD) method is used to generate the Koopman operator. Finally, a linear quadratic regulator (LQR) control method is applied for the control of the worm robot. …”
Get full text
Article -
406
Illumination in Museums: Four-Primary White LEDs to Optimize the Protective Effect and Color Quality
Published 2019-01-01“…Our results can provide the theory and application basis to manufacture white LEDs that are suitable for illuminating op-TCPs; the method can be further used in preparing white LEDs for other cultural relics.…”
Get full text
Article -
407
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
408
A, Evaluation methods for waterfront public spaces: insights from different spatial scales in chinese and international cities
Published 2025-07-01“…This research explores the evaluation methods for waterfront public spaces based on different project scales. …”
Get full text
Article -
409
-
410
Evaluating the impact of sales methods on profitability in the Japanese software industry
Published 2024-11-01Get full text
Article -
411
A new heuristic method of finding the initial basic feasible solution to solve the transportation problem
Published 2022-05-01“…The initial basic feasible solution (IBFS) is a significant step to achieve the minimal total cost (optimal solution) of the transportation problem. However, the existing methods of IBFS do not always provide a good feasible solution which can reduce the number of iterations to find the optimal solution. …”
Get full text
Article -
412
A Single-Field Finite Difference Time-Domain Method Verified Using a Novel Antenna Design with an Artificial Magnetic Conductor Enhanced Structure
Published 2025-04-01“…The Finite Difference Time-Domain (FDTD) method is a powerful tool for electromagnetic field analysis. …”
Get full text
Article -
413
-
414
-
415
Two Modified QN-Algorithms for Solving Unconstrained Optimization Problems
Published 2013-09-01Get full text
Article -
416
An artificial intelligence and machine learning-driven CFD simulation for optimizing thermal performance of blood-integrated ternary nano-fluid
Published 2025-12-01“…However, conventional methods for modelling and optimizing these frameworks frequently encounter challenges owing to their intricacy and the multitude of interconnected variables. …”
Get full text
Article -
417
Inertial-relaxed splitting for composite monotone inclusions
Published 2023-02-01Get full text
Article -
418
-
419
-
420
Different bee-flower survey methods impact conservation recommendations: comparing citizen science and academic surveys
Published 2025-06-01“…The bipartite networks differed substantially (compositional difference = 0.86), mainly due to rewiring of bee-flower interactions (0.69). …”
Get full text
Article