-
241
Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks
Published 2019-07-01“…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. …”
Get full text
Article -
242
A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America
Published 2024-01-01“…While the regulatory approaches differ across these regions, they share a common goal: ensuring that AI benefits society while minimizing negative impacts.…”
Get full text
Article -
243
An exploratory network analysis to investigate schizotypy’s structure using the ‘Multidimensional Schizotypy Scale’ and ‘Oxford-Liverpool Inventory’ in a healthy cohort
Published 2025-02-01“…Abstract Schizophrenia spectrum disorders and schizotypy share traits across positive, negative, and disorganised domains. …”
Get full text
Article -
244
Dual-Layer Dynamic Optimization Model for Carbon-Conscious Transport Mode Allocation
Published 2025-01-01“…A critical challenge lies in minimizing CO2 emissions from road networks while meeting diverse transport demands. However, at present the mode shares are set arbitrarily and may not be realistically achievable. …”
Get full text
Article -
245
Analysis of influencing factors and equity in hospitalization expense reimbursement for mobile populations based on random forest model: a cross-sectional study from China
Published 2025-08-01“…Secondly, the random forest algorithm was applied to evaluate the importance of the factors influencing hospitalization expense reimbursement. …”
Get full text
Article -
246
DMCM: Dwo-branch multilevel feature fusion with cross-attention mechanism for infrared and visible image fusion.
Published 2025-01-01“…Additionally, a lightweight cross-attention fusion module is introduced, optimizing the use of differential and shared features while minimizing computational complexity. …”
Get full text
Article -
247
Digital culture in the light of educational processes. Ad vocem for the remarks and musings of Jordan Shapiro concerning the digital childhood
Published 2025-06-01“…The aim of this article is to analyze Jordan Shapiro’s concept of digital childhood and to critically engage with some of its fundamental assumptions. While the authors share the conviction that digital culture plays a crucial role in both institutional and non-institutional education, they emphasize, more than Shapiro does, its structural conditions, including algorithmic control mechanisms and the commercialization of educational processes. …”
Get full text
Article -
248
Multi task detection method for operating status of belt conveyor based on DR-YOLOM
Published 2025-06-01“…The results show that compared to mainstream single detection algorithms, DR-YOLOM multi task detection algorithm has better comprehensive detection ability, and this algorithm can ensure high target recognition accuracy, segmentation accuracy, and appropriate inference speed with a small number of parameters. …”
Get full text
Article -
249
Determinants of depressive symptoms in multinational middle-aged and older adults
Published 2025-08-01“…Abstract This study harnesses machine learning to dissect the complex socioeconomic determinants of depression risk among older adults across five international cohorts (HRS, ELSA, SHARE, CHARLS, MHAS). Evaluating six predictive algorithms, XGBoost demonstrated superior performance in four cohorts (AUC 0.7677–0.8771), while LightGBM excelled in ELSA (AUC 0.9011). …”
Get full text
Article -
250
Control strategy of robotic manipulator based on multi-task reinforcement learning
Published 2025-02-01“…To tackle this issue, instead of uniform parameter sharing, we propose an adjudicate reconfiguration network model, which we integrate into the Soft Actor-Critic (SAC) algorithm to address the optimization problems brought about by parameter sharing in multi-task reinforcement learning algorithms. …”
Get full text
Article -
251
Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques
Published 2025-03-01“…To process these data, it requires substantial computing and storage resources for smooth implementation and execution. While centralized cloud computing offers scalability, flexibility, and resource sharing, it faces significant limitations in IoT-based applications, especially in terms of latency, bandwidth, security, and cost. …”
Get full text
Article -
252
Detection of water surface targets based on improved Deformable DETR
Published 2025-06-01“…The algorithm is designed to significantly enhance the inference and training speed of the model while improving detection accuracy, thus achieving more efficient and robust detection of water surface targets. …”
Get full text
Article -
253
A novel approach for music genre identification using ZFNet, ELM, and modified electric eel foraging optimizer
Published 2025-04-01“…The present research suggests a new method for music genre identification via integrating deep learning models with a metaheuristic algorithm. The proposed model uses a pre-trained Zeiler and Fergus Network (ZFNet) to extract high-level features from audio signals, while an Extreme Learning Machines (ELM) is utilized for efficient classification. …”
Get full text
Article -
254
Low latency Montgomery multiplier for cryptographic applications
Published 2021-07-01“…The proposed Montgomery multiplier is based on school-book multiplier, Karatsuba-Ofman algorithm and fast adders techniques. The Karatsuba-Ofman algorithm and school-book multiplier recommends cutting down the operands into smaller chunks while adders facilitate fast addition for large size operands. …”
Get full text
Article -
255
Injustice épistémique et démocratie délibérative à l’ère du numérique : l’envers du mouvement #BalanceTaStartUp
Published 2024-12-01“…I point out that anonymity, while allowing victims to share their experiences, becomes a weapon for online trolls and detractors, seeking to discredit these testimonies. …”
Get full text
Article -
256
Machine learning based on pangenome-wide association studies reveals the impact of host source on the zoonotic potential of closely related bacterial pathogens
Published 2025-08-01“…Integrating these genes into an ML model based on the support vector machine (SVM) algorithm allows us to predict the zoonotic potential of various Brucella strains with high accuracy. …”
Get full text
Article -
257
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure device communication. …”
Get full text
Article -
258
HSimulator: Hybrid Stochastic/Deterministic Simulation of Biochemical Reaction Networks
Published 2017-01-01“…HSimulator provides optimized implementation of a set of widespread state-of-the-art stochastic, deterministic, and hybrid simulation strategies including the first publicly available implementation of the Hybrid Rejection-based Stochastic Simulation Algorithm (HRSSA). HRSSA, the fastest hybrid algorithm to date, allows for an efficient simulation of the models while ensuring the exact simulation of a subset of the reaction network modeling slow reactions. …”
Get full text
Article -
259
Data augmentation scheme for federated learning with non-IID data
Published 2023-01-01“…To solve the problem that the model accuracy remains low when the data are not independent and identically distributed (non-IID) across different clients in federated learning, a privacy-preserving data augmentation scheme was proposed.Firstly, a data augmentation framework for federated learning scenarios was designed.All clients generated synthetic samples locally and shared them with each other, which eased the problem of client drift caused by the difference of clients’ data distributions.Secondly, based on generative adversarial network and differential privacy, a private sample generation algorithm was proposed.It helped clients to generate informative samples while preserving the privacy of clients’ local data.Finally, a differentially private label selection algorithm was proposed to ensure the labels of synthetic samples will not leak information.Simulation results demonstrate that under multiple non-IID data partition strategies, the proposed scheme can consistently improve the model accuracy and make the model converge faster.Compared with the benchmark approaches, the proposed scheme can achieve at least 25% accuracy improvement when each client has only one class of samples.…”
Get full text
Article -
260
Detection of Crack Sealant in the Pretreatment Process of Hot In-Place Recycling of Asphalt Pavement via Deep Learning Method
Published 2025-05-01“…This algorithm integrates the RepViT (Representation Learning with Visual Tokens) network to reduce computational complexity while capturing the global context of images. …”
Get full text
Article