-
941
-
942
BRIDGING PROFESSIONAL IDENTITY AND DIGITAL PLATFORMS: A COMPREHENSIVE STUDY OF SELF-MARKETING AND CAREER DEVELOPMENT
Published 2025-02-01“…This empirical investigation provides a foundation for further analysis with an expanded sample and the exploration of the algorithmic effects of digital platforms on content visibility. …”
Get full text
Article -
943
Integrated diagnostics and time series sensitivity assessment for growth monitoring of a medicinal plant (Glycyrrhiza uralensis Fisch.) based on unmanned aerial vehicle multispectr...
Published 2025-08-01“…PIs collectively achieved high-precision predictions (mean 0.42 ≤ R2 ≤ 0.94), with the prediction of PH using green leaf index (GLI) in BP algorithm attaining peak accuracy (R² = 0.94). VIs and PIs exhibited comparable predictive capacity for yield, with multi-indicators integrated modeling significantly enhancing performance: VIs achieved R² = 0.87 under RF algorithms, whereas PIs reached R² = 0.81 using BP algorithms. …”
Get full text
Article -
944
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
945
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
946
Enhancing Security and Authenticity in Immersive Environments
Published 2025-03-01“…As a result, ensuring the authenticity and integrity of virtual assets is of concern. This study proposes a cryptographic solution that leverages digital signatures and hash algorithms to secure virtual assets in immersive environments. …”
Get full text
Article -
947
Machine-learning models for differentiating benign and malignant breast masses: Integrating automated breast volume scanning intra-tumoral, peri-tumoral features, and clinical info...
Published 2025-04-01“…Conclusion This study demonstrates the value of integrating radiomics and clinical features for breast mass diagnosis, with optimized peritumoral regions enhancing model performance. …”
Get full text
Article -
948
Classification of Paddy Rice Planting Area Through Feature Selection Method Using Sentinel-1/2 Time Series Images
Published 2025-01-01“…Results indicated that: 1) The reconstruction of cloud-free time series images with the Cloud Score+ method and the integrated NSPI and MNSPI approach was stable and effective, with correlation coefficients (<italic>r</italic>) exceeding 0.87 and low values for indicators such as root mean square error (RMSE), Robert's edge (Edges), and local binary patterns (LBP), meeting the requirements for paddy rice classification. 2) The classification accuracy of combining Sentinel-1 polarization features with Sentinel-2 spectral features could improve by up to 10.52% compared to before the combination. …”
Get full text
Article -
949
Optimal Fuzzy Deep Neural Networks-Based Plant Disease Detection and Classification on UAV-Based Remote Sensed Data
Published 2024-01-01“…Moreover, this model’s scalability and efficiency improve its value for precision agriculture, optimizing resource usage and promoting sustainable farming practices. …”
Get full text
Article -
950
Existence and stability results for a coupled multi-term Caputo fractional differential equations
Published 2025-04-01Get full text
Article -
951
NoiseAugmentNet-HHO: Enhancing Histopathological Image Classification Through Noise Augmentation
Published 2024-01-01Get full text
Article -
952
-
953
-
954
Prediction of hydrogen production in proton exchange membrane water electrolysis via neural networks
Published 2024-11-01“…A novel approach is introduced by employing the Levenberg–Marquardt backpropagation (LMBP) algorithm for training the ANN. This model is designed to predict HPR based on critical operational parameters, including anode and cathode areas (mm2), cell voltage (V) and current (A), water flow rate (mL/min), power (W), and temperature (K). …”
Get full text
Article -
955
Evaluating Ecological Vulnerability and Its Driving Mechanisms in the Dongting Lake Region from a Multi-Method Integrated Perspective: Based on Geodetector and Explainable Machine...
Published 2025-07-01“…The EVI values were classified into five levels using the Natural Breaks (Jenks) method, and spatial autocorrelation analysis was applied to reveal spatial differentiation patterns. …”
Get full text
Article -
956
Prediction of China’s Silicon Wafer Price: A GA-PSO-BP Model
Published 2025-07-01“…This study addresses the issue by enhancing the BP model. It integrates the principles of genetic algorithm (GA) with particle swarm optimization (PSO) to develop a new model called the GA-PSO-BP. …”
Get full text
Article -
957
-
958
Integrating artificial neural networks, multi-objective metaheuristic optimization, and multi-criteria decision-making for improving MXene-based ionanofluids applicable in PV/T sol...
Published 2024-11-01“…The obtained models are integrated into the multi-objective particle swarm optimization (MOPSO) and multi-objective thermal exchange optimization (MOTEO) algorithms, forming a three-objective optimization problem. …”
Get full text
Article -
959
Energy Management of Plug-In Hybrid Electric Vehicles for Autonomous Driving in a Following Environment Based on Fuzzy Adaptive PID Control
Published 2024-01-01“…When the improved Cuckoo algorithm iterated to the 51st iteration, the fitness value of the method reached its maximum value and remained stable thereafter, reaching 97.13%. …”
Get full text
Article -
960
Secure gray image sharing framework with adaptive key generation using image digest
Published 2025-03-01“…The proposed algorithm generates a one-way hash value based on pixel intensity, which acts as a digital fingerprint for the image to validate integrity failures. …”
Get full text
Article