-
Article
Open AccessA Multiple Environment Available Path Planning Based on an Improved A* Algorithm
The objective of the path planning for a mobile robot is to generate a collision-free path from a starting position to a target position, aiming to realize a higher quality of path planning, an improved A* alg...
-
Article
Open AccessFuzzy Neural Network Model for Intelligent Course Development in Music and Dance Education
Interactions are mandatory for online or offline music and dance education to improve understandability and learning efficacy. The course designed for such artistic education incorporates multi-point interacti...
-
Article
Open AccessVSEM-SAMMI: An Explainable Multimodal Learning Approach to Predict User-Generated Image Helpfulness and Product Sales
Using user-generated content (UGC) is of utmost importance for e-commerce platforms to extract valuable commercial information. In this paper, we propose an explainable multimodal learning approach named the v...
-
Article
Open AccessRetraction Note to: A Hierarchical Algorithm Model for the Scheduling Problem of Cold Chain Logistics Distribution Vehicles Based on Machine Vision
-
Article
Open AccessSpeech Keyword Spotting Method Based on Swin-Transformer Model
With the rapid advancements in deep learning technology, the Transformer-based attention neural network has shown promising performance in keyword spotting (KWS). However, this method suffers from high computa...
-
Article
Open AccessRETRACTED ARTICLE: A Hierarchical Algorithm Model for the Scheduling Problem of Cold Chain Logistics Distribution Vehicles Based on Machine Vision
With the continuous development of the market economy, the professional degree of the logistics industry is constantly improving, while the logistics distribution industry is also develo** rapidly. The logis...
-
Article
Open AccessSelf-Supervised Learning for Industrial Image Anomaly Detection by Simulating Anomalous Samples
Industrial image anomaly detection (AD) is a critical issue that has been investigated in different research areas. Many works have attempted to detect anomalies by simulating anomalous samples. However, how t...
-
Article
Open AccessSecurity Energy Efficiency Analysis of CR-NOMA Enabled IoT Systems for Edge-cloud Environment
With the development of the Internet of Things (IoT), more and more devices are connected in edge-cloud environment, and spectrum scarcity has become a major bottleneck for the employment of IoT devices in the...
-
Article
Open AccessIntegrating Vision Transformer-Based Bilinear Pooling and Attention Network Fusion of RGB and Skeleton Features for Human Action Recognition
In this paper, we propose VT-BPAN, a novel approach that combines the capabilities of Vision Transformer (VT), bilinear pooling, and attention network fusion for effective human action recognition (HAR). The p...
-
Article
Open AccessNutritional Risk Assessment and Countermeasures for Stroke Patients Based on Deep Learning and Multimodal MRI Images
The main objective of this study is to evaluate the nutritional risk of stroke patients through deep learning and multimodal MRI images, and provide appropriate nutrition for patients in a timely manner to imp...
-
Article
The impact of smart city Internet firms network embeddedness on product innovation: a moderated mediating model
While networking integration has been regarded as a significant driver in technology development, it remains unknown which and how situations influence the online business innovation process. This study used s...
-
Article
Open AccessFootball Player Injury Full-Cycle Management and Monitoring System Based on Blockchain and Machine Learning Algorithm
Football injuries are the most common factor affecting a football player's performance, and the last thing a football player wants. To understand the causes of football players’ injuries and how to recover spo...
-
Article
Open AccessA Systematic Research on System Recovery Based on Improved Genetic Algorithm and Quotient Resilience Model Under Attack and Damage
The vulnerability of the current network has become an urgent problem to be solved. The focus of network protection should be shifted from traditional network protection to the direction of effective recovery ...
-
Article
Open AccessEnhanced beetle antennae search algorithm for complex and unbiased optimization
Beetle Antennae Search algorithm is a kind of intelligent optimization algorithms, which has the advantages of few parameters and simplicity. However, due to its inherent limitations, BAS has poor performance ...
-
Article
Open AccessAn Improved Whale Optimization Algorithm Based on Nonlinear Parameters and Feedback Mechanism
Whale optimization algorithm, as a relatively novel swarm-based intelligence optimization algorithm, has been extensively utilized in numerous scientific and engineering fields. The intent of this work was to ...
-
Article
Open AccessA Bi-directional Fuzzy C-Means Clustering Ensemble Algorithm Considering Local Information
The classic Fuzzy C-means (FCM) algorithm has limited clustering performance and is prone to misclassification of border points. This study offers a bi-directional FCM clustering ensemble approach that takes l...
-
Article
Open AccessA Novel Binary Slime Mould Algorithm with AU Strategy for Cognitive Radio Spectrum Allocation
Spectrum has now become a scarce resource due to the continuous development of wireless communication technology. Cognitive radio technology is considered to be a new method to solve the shortage of spectrum r...
-
Article
Open AccessStudy on a storage location strategy based on clustering and association algorithms
In this paper, we study the improvement of a storage location strategy through the use of big data technology, including data collection, cluster analysis and association analysis, to improve order picking eff...
-
Article
Open AccessAn Efficient Modified Particle Swarm Optimization Algorithm for Solving Mixed-Integer Nonlinear Programming Problems
This paper presents an efficient modified particle swarm optimization (EMPSO) algorithm for solving mixed-integer nonlinear programming problems. In the proposed algorithm, a new evolutionary strategies for th...
-
Article
Open AccessCategorical quantum cryptography for access control in cloud computing
Access control is a mechanism that is used to decide which agent has access to which resource with some specific operations. This paper is devoted to the investigation of quantum cryptography in access control...