Search
Search Results
-
Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications
The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...
-
Exploring superionic conduction in lithium oxyhalide solid electrolytes considering composition and structural factors
Lithium (Li) oxyhalides have emerged as promising solid electrolyte candidates for all-solid-state batteries (ASSBs) due to their superior ionic...
-
Procedure-Aware Action Quality Assessment: Datasets and Performance Evaluation
In this paper, we investigate the problem of procedure-aware action quality assessment, which analyzes the action quality by delving into the...
-
Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**
Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...
-
Transfer learning enables the rapid design of single crystal superalloys with superior creep resistances at ultrahigh temperature
Accelerating the design of Ni-based single crystal (SX) superalloys with superior creep resistance at ultrahigh temperatures is a desirable goal but...
-
Failure analysis in smart grid solar integration using an extended decision-making-based FMEA model under uncertain environment
Failures in the integration of solar energy into smart grids can have significant implications for energy reliability and environmental...
-
Design of polar boundaries enhancing negative electrocaloric performance by antiferroelectric phase-field simulations
Electrocaloric refrigeration which is environmentally benign has attracted considerable attention. In distinction to ferroelectric materials, which...
-
Privacy-preserving matrix factorization for recommendation systems using Gaussian mechanism and functional mechanism
Building a recommendation system involves analyzing user data, which can potentially leak sensitive information about users. As shown in numerous...
-
DNA codes over \(GR(2^{3},d)[X]/\langle X^{2},2X \rangle\)
The main results of this paper are in two directions. First, the family of finite local rings of length 4 whose annihilator of their maximal ideals...
-
Parameters optimization and precision enhancement of Takagi–Sugeno fuzzy neural network
Takagi–Sugeno fuzzy neural network (TSFNN) has been widely used in intelligent prediction. The prediction accuracy of TSFNN is impacted by its model...
-
A novel fusion feature imageization with improved extreme learning machine for network anomaly detection
As the complexity and quantity of network data continue to increase, accurate and efficient anomaly detection methods become critical. Deep...
-
MDGCL: Graph Contrastive Learning Framework with Multiple Graph Diffusion Methods
In recent years, some classical graph contrastive learning(GCL) frameworks have been proposed to address the problem of sparse labeling of graph data...
-
Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN
Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...
-
Net versus relative impacts in public policy automation: a conjoint analysis of attitudes of Black Americans
The use of algorithms and automated systems, especially those leveraging artificial intelligence (AI), has been exploding in the public sector, but...
-
Forecasting short- and medium-term streamflow using stacked ensemble models and different meta-learners
Streamflow forecasting holds a pivotal role in the effective management of water resources, flood control, hydropower generation, agricultural...
-
Quantifying the stochastic trends of climate extremes over Yemen: a comprehensive assessment using ERA5 data
Climate change is worsening existing vulnerabilities in develo** countries such as Yemen. This study examined the spatial distribution trends of...
-
Fake and propaganda images detection using automated adaptive gaining sharing knowledge algorithm with DenseNet121
An additional tool for swaying public opinion on social media is to present recent developments in the creation of natural language. The term “Deep...
-
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier
A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...