Search alternatives:
value integration » ai integration (Expand Search)
Showing 941 - 960 results of 2,584 for search 'value integration algorithm', query time: 0.13s Refine Results
  1. 941
  2. 942

    BRIDGING PROFESSIONAL IDENTITY AND DIGITAL PLATFORMS: A COMPREHENSIVE STUDY OF SELF-MARKETING AND CAREER DEVELOPMENT by Aram Qadir, Jacek Binda

    Published 2025-02-01
    “…This empirical investigation provides a foundation for further analysis with an expanded sample and the exploration of the algorithmic effects of digital platforms on content visibility. …”
    Get full text
    Article
  3. 943

    Integrated diagnostics and time series sensitivity assessment for growth monitoring of a medicinal plant (Glycyrrhiza uralensis Fisch.) based on unmanned aerial vehicle multispectr... by Ao Zhang, Haibin Guan, Zhiheng Dong, Xin Jia, Yan Xue, Fengyu Han, Lingjiang Meng, Xiuling Yu, Xiaoqin Wang, Yang Cao

    Published 2025-08-01
    “…PIs collectively achieved high-precision predictions (mean 0.42 ≤ R2 ≤ 0.94), with the prediction of PH using green leaf index (GLI) in BP algorithm attaining peak accuracy (R² = 0.94). VIs and PIs exhibited comparable predictive capacity for yield, with multi-indicators integrated modeling significantly enhancing performance: VIs achieved R² = 0.87 under RF algorithms, whereas PIs reached R² = 0.81 using BP algorithms. …”
    Get full text
    Article
  4. 944

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  5. 945

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  6. 946

    Enhancing Security and Authenticity in Immersive Environments by Rebecca Acheampong, Dorin-Mircea Popovici, Titus Balan, Alexandre Rekeraho, Manuel Soto Ramos

    Published 2025-03-01
    “…As a result, ensuring the authenticity and integrity of virtual assets is of concern. This study proposes a cryptographic solution that leverages digital signatures and hash algorithms to secure virtual assets in immersive environments. …”
    Get full text
    Article
  7. 947

    Machine-learning models for differentiating benign and malignant breast masses: Integrating automated breast volume scanning intra-tumoral, peri-tumoral features, and clinical info... by Meixue Dai, Yueqiong Yan, Zhong Li, Jidong Xiao

    Published 2025-04-01
    “…Conclusion This study demonstrates the value of integrating radiomics and clinical features for breast mass diagnosis, with optimized peritumoral regions enhancing model performance. …”
    Get full text
    Article
  8. 948

    Classification of Paddy Rice Planting Area Through Feature Selection Method Using Sentinel-1/2 Time Series Images by Shiyu Zhang, Pengao Li, Yong Xie, Wen Shao, Xueru Tian

    Published 2025-01-01
    “…Results indicated that: 1) The reconstruction of cloud-free time series images with the Cloud Score+ method and the integrated NSPI and MNSPI approach was stable and effective, with correlation coefficients (<italic>r</italic>) exceeding 0.87 and low values for indicators such as root mean square error (RMSE), Robert&#x0027;s edge (Edges), and local binary patterns (LBP), meeting the requirements for paddy rice classification. 2) The classification accuracy of combining Sentinel-1 polarization features with Sentinel-2 spectral features could improve by up to 10.52% compared to before the combination. …”
    Get full text
    Article
  9. 949

    Optimal Fuzzy Deep Neural Networks-Based Plant Disease Detection and Classification on UAV-Based Remote Sensed Data by M. Pajany, S. Venkatraman, U. Sakthi, M. Sujatha, Mohamad Khairi Ishak

    Published 2024-01-01
    “…Moreover, this model&#x2019;s scalability and efficiency improve its value for precision agriculture, optimizing resource usage and promoting sustainable farming practices. …”
    Get full text
    Article
  10. 950
  11. 951
  12. 952
  13. 953
  14. 954

    Prediction of hydrogen production in proton exchange membrane water electrolysis via neural networks by Muhammad Tawalbeh, Ibrahim Shomope, Amani Al-Othman, Hussam Alshraideh

    Published 2024-11-01
    “…A novel approach is introduced by employing the Levenberg–Marquardt backpropagation (LMBP) algorithm for training the ANN. This model is designed to predict HPR based on critical operational parameters, including anode and cathode areas (mm2), cell voltage (V) and current (A), water flow rate (mL/min), power (W), and temperature (K). …”
    Get full text
    Article
  15. 955

    Evaluating Ecological Vulnerability and Its Driving Mechanisms in the Dongting Lake Region from a Multi-Method Integrated Perspective: Based on Geodetector and Explainable Machine... by Fuchao Li, Tian Nan, Huang Zhang, Kun Luo, Kui Xiang, Yi Peng

    Published 2025-07-01
    “…The EVI values were classified into five levels using the Natural Breaks (Jenks) method, and spatial autocorrelation analysis was applied to reveal spatial differentiation patterns. …”
    Get full text
    Article
  16. 956

    Prediction of China’s Silicon Wafer Price: A GA-PSO-BP Model by Jining Wang, Hui Chen, Lei Wang

    Published 2025-07-01
    “…This study addresses the issue by enhancing the BP model. It integrates the principles of genetic algorithm (GA) with particle swarm optimization (PSO) to develop a new model called the GA-PSO-BP. …”
    Get full text
    Article
  17. 957
  18. 958

    Integrating artificial neural networks, multi-objective metaheuristic optimization, and multi-criteria decision-making for improving MXene-based ionanofluids applicable in PV/T sol... by Tao Hai, Ali Basem, As’ad Alizadeh, Kamal Sharma, Dheyaa J. jasim, Husam Rajab, Abdelkader Mabrouk, Lioua Kolsi, Wajdi Rajhi, Hamid Maleki, Narinderjit Singh Sawaran Singh

    Published 2024-11-01
    “…The obtained models are integrated into the multi-objective particle swarm optimization (MOPSO) and multi-objective thermal exchange optimization (MOTEO) algorithms, forming a three-objective optimization problem. …”
    Get full text
    Article
  19. 959

    Energy Management of Plug-In Hybrid Electric Vehicles for Autonomous Driving in a Following Environment Based on Fuzzy Adaptive PID Control by Jixin Wang, Yujin Zhou

    Published 2024-01-01
    “…When the improved Cuckoo algorithm iterated to the 51st iteration, the fitness value of the method reached its maximum value and remained stable thereafter, reaching 97.13%. …”
    Get full text
    Article
  20. 960

    Secure gray image sharing framework with adaptive key generation using image digest by C. Nithya, C. Lakshmi, K. Thenmozhi, M. V. Harshavardhan, R. Kumaran, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan

    Published 2025-03-01
    “…The proposed algorithm generates a one-way hash value based on pixel intensity, which acts as a digital fingerprint for the image to validate integrity failures. …”
    Get full text
    Article