-
181
Artificial Intelligence-driven optimization of V2G and charging point selection en-route: A systematic literature review
Published 2025-04-01“…The common implementation of electric vehicles (EVs) necessitates effective integration strategies to ensure their seamless interaction with the electrical grid while meeting private EV customer preferences and enhancing grid stability. …”
Get full text
Article -
182
Development of a Conditional Generative Adversarial Network Model for Television Spectrum Radio Environment Mapping
Published 2024-01-01“…The U-Net generator is a 3-channel input, 16-layer architecture while the PatchGan discriminator is a 6-channel input, 7-layer architecture. …”
Get full text
Article -
183
-
184
Improved Sliding Mode Active Disturbance Rejection Control for Single-inductance Dual-output Buck Converter
Published 2025-07-01“…However, because both output branches share a single inductor, significant cross-coupling arises during input voltage transients and load disturbances, degrading output voltage performance. …”
Get full text
Article -
185
Overcoming Fairness and Latency Challenges in BBR With an Adaptive Delay Detection
Published 2025-01-01“…In 2016, Google introduced a new congestion control algorithm called Bottleneck Bandwidth and Round-trip propagation time (BBR). …”
Get full text
Article -
186
Genetic Links Between Common Lung Diseases and Lung Cancer Progression: Bioinformatics and Machine Learning Insights
Published 2025-04-01“…We began by identifying differentially expressed genes (DEGs) in LC and CLDs, and our gene-disease network revealed for the first time shared DEGs (LC shares significant genes with TB (36), asthma (10), pneumonia (17), COPD (18), and Idiopathic Pulmonary Fibrosis (IPF) (78)), providing insights into potential connections of LC with CLDs. …”
Get full text
Article -
187
A Reconfigurable Framework for Hybrid Quantum–Classical Computing
Published 2025-05-01“…The proposed framework integrates field-programmable gate arrays (FPGAs) with quantum processing units (QPUs) for deploying HQC algorithms. The classical subroutines of the algorithms are accelerated on FPGA fabric using a high-throughput processing pipeline, while quantum subroutines are executed on the QPUs. …”
Get full text
Article -
188
PBD-YOLO: Dual-Strategy Integration of Multi-Scale Feature Fusion and Weak Texture Enhancement for Lightweight Particleboard Surface Defect Detection
Published 2025-04-01“…In order to improve the algorithm’s ability to detect multi-scale defects, this study introduced the ShareSepHead (Share Separated Head) and C2f_SAC (C2f module with Switchable Atrous Convolution) modules. …”
Get full text
Article -
189
Low Cost Safety Data Storage and Processing Framework Under Cloud Environment
Published 2015-02-01“…The framework studied data mining algorithms based on the matrix, whose focus was the secure Top-k feature vector algorithm. …”
Get full text
Article -
190
Long-Term Multiyear Transmission Expansion Planning in Turkish Power System
Published 2024-01-01“…In this study, a new binary version of the original FBI algorithm called the BFBI (binary forensic-based investigation) algorithm is developed to solve the binary TEP problem. …”
Get full text
Article -
191
A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals
Published 2012-01-01“…The security of smart mobile terminals has been an increasingly important issue in recent years. While there are extensive researches on virus detections for smart mobile terminals, most of them share the same framework of virus detection as that for personal computers, and few of them tackle the problem from the standpoint of detection methodology. …”
Get full text
Article -
192
Application-centric congestion control
Published 2025-06-01“…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
Get full text
Article -
193
The nonlinear impact of cycling environment on bicycle distance: A perspective combining objective and perceptual dimensions
Published 2024-03-01“…Land use demonstrates a threshold effect, with cycling distances increasing when the recreational facilities share exceeds 8%, transport facilities share remains below 25%, and commercial facilities share stays below 30%. …”
Get full text
Article -
194
Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy
Published 2010-01-01“…The Hidden Anchor algorithm exploits the inherently noisy wireless channel and uses identity cloning of neighboring trusted nodes to make anchors unobservable to un-trusted nodes while providing complete information to trusted nodes. …”
Get full text
Article -
195
Geometric Degree Reduction of Wang–Ball Curves
Published 2023-01-01“…There are substantial methods of degree reduction in the literature. Existing methods share some common limitations, such as lack of geometric continuity, complex computations, and one-degree reduction at a time. …”
Get full text
Article -
196
Unitanony: a fine-grained and practical anonymization framework for better data utility
Published 2025-07-01“…K-anonymity and l-diversity secure against identity and attribute disclosure. Anonymization algorithms enforce the above models and are willing to reach two primary goals: achieving the privacy objective while maximizing data utility. …”
Get full text
Article -
197
Adaptive Bayesian optimization for proportional derivative control in double-acting piston pump ventilators
Published 2025-07-01“…Numerous studies have developed simple ventilators, including bag valve mask ventilators, centrifugal blower ventilators, pneumatic ventilators, or double-acting piston pump ventilators, to prepare for future respiratory pandemics. While these ventilators share the common goal of maintaining precise air volume and pressure control, the practical development of control systems for double-acting piston pump ventilators remains under-explored. …”
Get full text
Article -
198
DRL-based max-min fair RIS discrete phase shift optimization for MISO-OFDM systems
Published 2023-09-01“…Simulation results demonstrate that the proposed DRL-based algorithm can achieve almost optimal performance, while has much less computation consumption.…”
Get full text
Article -
199
Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China
Published 2022-01-01“…The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
Get full text
Article -
200
Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach
Published 2025-02-01“…In this paper, we propose a distributed time coalition formation game algorithm that ensures the absence of internal interference and collisions while sharing time slot resources, thereby enhancing the network’s throughput performance. …”
Get full text
Article