-
1
An Energy Efficient, Robust, Sustainable, and Low Computational Cost Method for Mobile Malware Detection
Published 2023-01-01Get full text
Article -
2
A Study on the Consistency and Efficiency of Student Performance Evaluation Methods: A Mathematical Framework and Comparative Simulation Results
Published 2025-05-01“…We compared the mathematical consistency and efficiency of the methods addressed in this study through simulation runs. …”
Get full text
Article -
3
-
4
IMPROVEMENT OF THE HYDRAULIC EXCAVATOR’S WORKING EQUIPMENT
Published 2020-03-01Get full text
Article -
5
Photoluminescent Device for Monitoring Fusarium Infection in Seeds
Published 2024-12-01“…An analysis of optical methods and devices for diagnosing plant infestations was carried out. …”
Get full text
Article -
6
Assessment methods for bicycle environment safety and comfort: A scoping review
Published 2025-06-01“…However, selecting appropriate methods for specific contexts cannot be undermined. …”
Get full text
Article -
7
Twinkle: A GPU-based Binary-lens Microlensing Code with the Contour Integration Method
Published 2025-01-01“…We also devise an improved method for robustly identifying ghost images, thereby enhancing computational reliability. …”
Get full text
Article -
8
Urban Planning with Rational Green Infrastructure Placement Using a Critical Area Detection Method
Published 2024-07-01“…By employing the developed method, the study successfully locates priority zones for GI implementation in Saitama City, Japan, effectively pinpointing areas that require immediate attention. …”
Get full text
Article -
9
Design of an Exam Cheating Detection System Application Based on Machine Learning with the Computer Vision Method
Published 2025-07-01“…This cheating not only harms honest students but also undermines the integrity of the education system. In today's digital age, various forms of cheating are increasingly difficult to detect using manual proctoring methods. …”
Get full text
Article -
10
A Precise Prediction Method for Subsurface Temperatures Based on the Rock Resistivity–Temperature Coupling Model
Published 2025-04-01“…However, the existing methods encounter significant challenges in predicting the distribution characteristics of deep temperature fields with both efficiency and accuracy. …”
Get full text
Article -
11
-
12
A Data Cleaning Method for the Identification of Outliers in Fishing Vessel Trajectories Based on a Geocoding Algorithm
Published 2025-05-01“…If there is no intersection, it is determined that the current fishing vessel position is an outlier, and this point will be excluded. The method proposed in this study is able to effectively identify outliers in trajectory data, achieving efficient and effective trajectory data cleaning and improving the accuracy and reliability of the data.…”
Get full text
Article -
13
An improved hybrid policy optimization method for economic-preference dispatch considering cross time-scales collaboration
Published 2025-08-01“…However, existing DRL methods have a deficiency in reasonably responding to the relatively long time-scale power schedule at the dispatching level, which undermines the cooperativity between the expected schedule and RAPD and also results in the incapability of well-tracking the operation preferences. …”
Get full text
Article -
14
Método de avaliação da suspensão do SMAS no rejuvenescimento facial A method to evaluate the SMAS suspension in facelift
Published 2012-09-01“…CONCLUSIONS: The described methodology confirms that the round block SMAS treatment technique is efficient regarding the suspension of the superficial muscular aponeurotic system, with significant reduction of the undermined area, consequently reducing the dead space, and may be a parameter to comparison of different techniques.…”
Get full text
Article -
15
Low Capillary Elastic Flow Model Optimization Using the Lattice Boltzmann Method and Non-Dominated Sorting Genetic Algorithm
Published 2025-02-01“…In simulations of elastic flow using the lattice Boltzmann method (LBM), the steady-state behavior of the flow at low capillary numbers is typically poor and prone to the formation of bubbles with inhomogeneous lengths. …”
Get full text
Article -
16
XGBoost-Based Detection of DDoS Attacks in Named Data Networking
Published 2025-05-01“…These attacks exploit the inherent data retrieval and caching mechanisms of NDN, leading to severe disruptions in data availability and network efficiency, thereby undermining the overall performance and reliability of the system. …”
Get full text
Article -
17
Lighting the path to growth: Exploring the impact of energy efficiency on firm productivity in Nigeria
Published 2025-07-01“…Energy inefficiency remains a major constraint on firm productivity in Nigeria, particularly in the manufacturing and service sectors, where unreliable and costly electricity supply undermines competitiveness. This study contributes to the literature by examining the relationship between energy efficiency and firm-level total factor productivity (TFP) using a two-stage approach: estimating energy efficiency scores using the Stochastic Frontier Analysis (SFA) framework, and analyzing their impact on productivity using the Instrumental Variables Generalized Method of Moments (IV-GMM) regression. …”
Get full text
Article -
18
An Efficient Approach Based on RAE-GAMI-NET for Long Range Attack Detection on Blockchain
Published 2025-01-01Get full text
Article -
19
Efficient Detection of Mind Wandering During Reading Aloud Using Blinks, Pitch Frequency, and Reading Rate
Published 2025-04-01Get full text
Article -
20
Optimized classification of potato leaf disease using EfficientNet-LITE and KE-SVM in diverse environments
Published 2025-05-01“…Inconsistent data in uncontrolled contexts undermines classic image classification techniques, hindering precise illness detection.MethodsWe present a novel model that integrates EfficientNet-LITE for enhanced feature extraction with KE-SVM Optimization for effective classification. …”
Get full text
Article