-
541
Sleeping Schedule-Aware Local Broadcast in Wireless Sensor Networks
Published 2013-12-01“…To guarantee proper transmission of broadcast messages, a sleep-aware forwarding mechanism is implemented. Moreover, heuristic strategies are used to decrease the number of transmissions and the broadcast latency. …”
Get full text
Article -
542
Telefacturing Based Distributed Manufacturing Environment for Optimal Manufacturing Service by Enhancing the Interoperability in the Hubs
Published 2017-01-01“…With an evolutionary algorithm and developed heuristic algorithm, the performance of the proposed manufacturing system has been improved. …”
Get full text
Article -
543
Is Communism Incompatible with Religion?: Islam and Communism in Haji Misbach's Thoughts (1914-1926)
Published 2024-06-01“…The study in this article uses the historical method with the stages of heuristic, source criticism, interpretation, and historiography. …”
Get full text
Article -
544
Optimization of the Operation Plan of Airport Express Train with Consideration of Train Departure Time Window
Published 2024-01-01“…Neighborhood solution strategies include the increase or haut of train operations and the adjustment of the number of stops, which refines the solution space and boosts the process efficiency of the heuristic algorithm. Additionally, the model and algorithm proposed in this paper are practiced during the peak hour of Nanjing Metro Line S1 for empirical validation. …”
Get full text
Article -
545
A Green Demand-Responsive Airport Shuttle Service Problem with Time-Varying Speeds
Published 2020-01-01“…Since this task is an NP-hard problem, a heuristic-based nondominated sorting genetic algorithm (NSGA-II) is also presented to find Pareto optimal solutions in a reasonable amount of time. …”
Get full text
Article -
546
A multi-faceted review of wind turbine optimization techniques: Metaheuristics and related issues
Published 2025-03-01“…Metaheuristic optimization algorithms combine fundamental heuristic concepts with approximation approaches to effectively explore and utilize research space. …”
Get full text
Article -
547
QTFN: A General End-to-End Time-Frequency Network to Reveal the Time-Varying Signatures of the Time Series
Published 2024-09-01“…Guided by classic TFD theory, the design of this deep learning architecture is heuristic, which firstly generates various basis functions through data-driven. …”
Get full text
Article -
548
Current development and future prospects of multi-target assignment problem: A bibliometric analysis review
Published 2025-01-01“…Subsequently, existing solution algorithms for the MTA problem are reviewed, generally falling into three categories: exact algorithms, heuristic algorithms, and machine learning algorithms. …”
Get full text
Article -
549
Nature-Inspired Metaheuristics for Two-Agent Scheduling with Due Date and Release Time
Published 2020-01-01“…This paper provides mathematical models, heuristic algorithms, and two nature-based metaheuristic algorithms to solve the problem. …”
Get full text
Article -
550
Ambonsche Studiefonds and Sarekat Ambon as Forums for Moluccan Nationalists to Initiate Indonesian Independence Movement
Published 2024-08-01“…Based on the findings in the heuristic process, this research emphasizes the importance of understanding and appreciating the role of Malukan nationalists in the history of Indonesia's independence struggle. …”
Get full text
Article -
551
Coupling Beams’ Shear Capacity Prediction by Hybrid Support Vector Regression and Particle Swarm Optimization
Published 2025-01-01“…Nevertheless, the capability of this regression method deeply relies on picking its best hyperparameters. To handle this, a heuristic optimization procedure named Particle Swarm Optimization (PSO) was merged with SVR to select the optimal hyperparameters. …”
Get full text
Article -
552
Functionally-informed fine-mapping identifies genetic variants linking increased CHD1L expression and HIV restriction in monocytes
Published 2025-01-01“…However, it remains unclear if HIV spVL associated variants are associated with CHD1L gene expression changes. Here we apply a heuristic fine-mapping approach to prioritize combinations of variants that explain the majority of set-point viral load variance and identify variants likely driving the association. …”
Get full text
Article -
553
Spare Parts Inventory Optimization for Military Vehicles Using a Mixed Probability Distribution
Published 2024-07-01“…This is because the use of meta-heuristic methods to check and analyze the sensitivity of inventory optimization models can lead to better and more accurate results, and also the use of these methods is relatively new and helps in solving optimization problems. …”
Get full text
Article -
554
DESCARTES’ COMPREHENSION OF HUMAN NATURE IN «DISCOURSE ON THE METHOD»
Published 2014-12-01“…As the methodological base is proposed to use the heuristic potential of phenomenology and existentialism, as well as those publications of foreign Descartes’ researchers of recent times, which introduce the new way for understanding of Descartes’ philosophical heritage. …”
Get full text
Article -
555
Knowledge Visualization Centers and University Infographics: International and Domestic Experience
Published 2020-07-01“…The potentials of infographics for the university environment provide an opportunity to visually operate with vast volumes of knowledge, to search for new interdisciplinary nexus-points and heuristic intersections in the network structure of university science. …”
Get full text
Article -
556
Estimation of Ultimate Bearing Capacity in Rock-Socketed Piles Using Optimized Machine Learning Approaches
Published 2023-12-01“…To enhance the model's precision, the study incorporates two state-of-the-art meta-heuristic algorithms, the Artificial Hummingbird Algorithm (AHA) and the Improved Grey Wolf Optimizer (IGWO), into the analysis. …”
Get full text
Article -
557
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
Get full text
Article -
558
INTERPASSIVITY AS A SUBJECTIVE EFFECT OF MODERN MEDIA-CULTURE: TO THE STATEMENT OF PROBLEM
Published 2014-06-01“…Methodological base of research of contemporary experience of subjectivity is heuristic "ontological turn" in social theory, which allows to consider the subjectivity not as a reality (given), but as a procedural phenomenon, performativity, which exist in conditions of unstable ontologies, world without guarantees, indirect, thus, mass-media representations. …”
Get full text
Article -
559
ASD: Interaction and socialisation through an adapted social network
Published 2025-02-01“…Subsequently, the usability of the social network was evaluated by three specialists using Nielsen's heuristic evaluation technique, revealing few usability issues, as presented in this article. …”
Get full text
Article -
560
Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors
Published 2025-01-01“…Additionally, we propose three alternative virtual node-driven scheduling algorithms, the extension of a random algorithm, a genetic algorithm, and a heuristic algorithm, respectively. These algorithms serve as benchmarks for comparison with the proposed ILP model. …”
Get full text
Article