-
521
Stability Evaluation Method for Rock Slope-Anchorage Systems Based on Genetic Algorithms and Discrete Element Analysis
Published 2025-05-01“…The findings indicate that (1) the proposed evaluation method effectively accounts for the interaction between the anchorage structure and the rock slope, ensuring accurate results; (2) the method leverages the discrete element numerical model to quantitatively assess deformation and stress distribution within the system; (3) the integration of genetic algorithms significantly enhances the efficiency of identifying the most representative numerical model, and thereby the efficiency of stability evaluation is improved; and (4) the evaluation framework is capable of performing dynamic analyses of the stability evolution throughout the entire operational lifecycle of the rock slope anchorage system.…”
Get full text
Article -
522
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
523
Comparative analysis of software optimization methods in context of branch predication on GPUs
Published 2021-12-01“…Covered approaches include: optimizing compilers, JIT-compilation, branch predictor, speculative execution, adaptive optimization, run-time algorithm specialization, profile-guided optimization. …”
Get full text
Article -
524
Enhancing LoRaWAN Performance Using Boosting Machine Learning Algorithms Under Environmental Variations
Published 2025-06-01“…Bayesian Optimization was applied to fine-tune hyperparameters to improve model accuracy. …”
Get full text
Article -
525
Robust Adaptive Path Tracking Control Scheme for Safe Autonomous Driving via Predicted Interval Algorithm
Published 2022-01-01Get full text
Article -
526
Radial Basis Function Coupling with Metaheuristic Algorithms for Estimating the Compressive Strength and Slump of High-Performance Concrete
Published 2024-12-01“…The contribution in this paper proposes the following: the radial basis function (RBF) model will be enhanced by using two optimization algorithms, namely Horse Herd Optimization (HHO) and Wild Geese Algorithm (WGA). …”
Get full text
Article -
527
Improved Correlation of Oil Recovery Factor for Water Driven Reservoirs in the Niger Delta
Published 2025-07-01Get full text
Article -
528
Selective opposition based constrained barnacle mating optimization: Theory and applications
Published 2024-12-01“…In addition to increasing efficiency by cutting down on wasted time spent exploring, this also increases the likelihood of stumbling onto optimal solutions. After that, it is put through its paces in a real-world case study, where it proves to be superior to the most cutting-edge algorithms available.…”
Get full text
Article -
529
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Published 2024-12-01“… Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. …”
Get full text
Article -
530
AI-Driven Predictive Maintenance for Workforce and Service Optimization in the Automotive Sector
Published 2025-06-01“…However, conventional approaches frequently do not successfully forecast which clients are most likely to need or utilize maintenance services. …”
Get full text
Article -
531
A location-constrained crowdsensing task allocation method for improving user satisfaction
Published 2019-10-01Get full text
Article -
532
Optimization of microwave components using machine learning and rapid sensitivity analysis
Published 2024-12-01“…On the other hand, the most widely used nature-inspired algorithms require large numbers of system simulations to yield a satisfactory design. …”
Get full text
Article -
533
Precision Measurement and Feature Selection in Medical Diagnostics using Hybrid Genetic Algorithm and Support Vector Machine
Published 2025-07-01“…Breast cancer, which affects a large number of women each year, requires effective methods for early detection and accurate diagnosis to improve patient outcomes. This study introduces a hybrid feature selection method based on genetic algorithm (GA) and Bucket of Models (BoM) approach to improve breast cancer detection and classification. …”
Get full text
Article -
534
Machine Learning Innovations for Improving Mineral Recovery and Processing: A Comprehensive Review*
Published 2024-12-01Get full text
Article -
535
Courier Assignment and Routing Problem Algorithm in Online Food Delivery System with Multi-Customer Delivery Patterns
Published 2025-03-01“…After processing and analyzing the numerical data, the study identified the most effective scenario that led to improved delivery times and benefits for couriers, enabling them to manage more orders and achieve faster delivery compared to existing algorithms. …”
Get full text
Article -
536
Smallest-Small-World Cellular Harmony Search for Optimization of Unconstrained Benchmark Problems
Published 2013-01-01“…Harmony search has successfully been applied to a wide variety of practical optimization problems. Most of the previous researches have sought to improve the performance of the HS algorithm by changing the pitch adjusting rate and harmony memory considering rate. …”
Get full text
Article -
537
-
538
A Wi-Fi RSS-RTT Indoor Positioning Model Based on Dynamic Model Switching Algorithm
Published 2024-01-01“…However, their performance varies significantly across different indoor environments, making it challenging to identify the most suitable system for all scenarios. To address this challenge, we propose an algorithm that dynamically selects the most optimal Wi-Fi positioning model for each location. …”
Get full text
Article -
539
-
540
Kinematic Constrained RRT Algorithm with Post Waypoint Shift for the Shortest Path Planning of Wheeled Mobile Robots
Published 2024-10-01“…Once the distance between the new node and the target is within a certain threshold, the tree growth stops and a target connection based on minimum turning radius arc is proposed to generate an initial complete random path. The most significant difference from traditional RRT-based methods is that the proposed method optimizes the path based on Dubins curves through a post waypoint shift after a random path is generated, rather than through parent node selection and rewiring during the exploring tree growth. …”
Get full text
Article