-
3561
Modelling and Solving Rescheduling Problems in Dynamic Permutation Flow Shop Environments
Published 2020-01-01“…The aim of this paper is to analyse, model, and solve the rescheduling problem in dynamic permutation flow shop environments while considering several criteria to optimize. Searching optimal solutions in multiobjective optimization problems may be difficult as these objectives are expressing different concepts and are not directly comparable. …”
Get full text
Article -
3562
Recommendations on Chronic Constipation (Including Constipation Associated with Irritable Bowel Syndrome) Treatment
Published 2007-01-01“…The myriad of treatment options available to Canadian physicians can be confusing; thus, the main aim of the recommendations and treatment algorithm is to optimize the approach in clinical care based on available evidence.…”
Get full text
Article -
3563
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01“…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. …”
Get full text
Article -
3564
Blood Scattering Model for Pulsed Doppler
Published 2014-09-01“…Generated data are used for optimization and validation of Doppler signals processing algorithms. …”
Get full text
Article -
3565
Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations
Published 2017-01-01“…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
Get full text
Article -
3566
Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints
Published 2023-01-01“…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
Get full text
Article -
3567
Scar Management in Pediatric Patients
Published 2025-03-01“…<i>Background and Objectives</i>: Pediatric patients can acquire scars from both accidental injury and surgical procedures. While scars cannot be avoided if a full-thickness injury occurs, scar visibility may be minimized through a variety of approaches. …”
Get full text
Article -
3568
Impact of summer heat and mitigation strategies on apple (Cosmic Crisp®) fruit color dynamics quantified using crop physiology sensing system
Published 2025-10-01“…CPSS with integrated RGB imaging data were contrasted with ambient air temperature (Tair) within each treatment using a custom developed algorithm. The algorithm allowed automated and daily quantification of fruit color metrics, including hue angle (h°), color transition from green to red (a∗), and chroma. …”
Get full text
Article -
3569
Robust sparse smooth principal component analysis for face reconstruction and recognition.
Published 2025-01-01“…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
Get full text
Article -
3570
Financial Management of Innovative Activity
Published 2019-12-01“…A form of control functional was obtained on the sets of observable characteristics of the controlling and controlled subsystems while optimizing the results of innovative activity due to the feedback channel. …”
Get full text
Article -
3571
Deep knowledge tracing and cognitive load estimation for personalized learning path generation using neural network architecture
Published 2025-07-01“…A dual-objective optimization algorithm balances knowledge acquisition with cognitive load management to generate paths that maintain optimal challenge levels. …”
Get full text
Article -
3572
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
3573
Efficient multiplication for finite fields of p characteristic
Published 2009-01-01“…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
Get full text
Article -
3574
Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations
Published 2023-01-01“…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
Get full text
Article -
3575
Improving cancer detection through computer-aided diagnosis: A comprehensive analysis of nonlinear and texture features in breast thermograms.
Published 2025-01-01“…The effectiveness of the proposed approach is enhanced by integrating texture and complexity features. Besides, to optimize feature selection and reduce redundancy, a metaheuristic optimization technique called Non-Dominated Sorting Genetic Algorithm (NSGA III) is applied. …”
Get full text
Article -
3576
Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event
Published 2025-04-01“…Experiments shows that the EDRA algorithm can reduce energy consumption by 32.4% compared to advanced algorithms while ensuring stronger system performance.…”
Get full text
Article -
3577
Machine learning for Internet of Things (IoT) device identification: a comparative study
Published 2025-05-01“…Additionally, we implemented a Binary Green Wolf Optimizer (BGWO) and compared its performance with that of traditional ML classifiers to assess the potential of this binary meta-heuristic algorithm. …”
Get full text
Article -
3578
Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot
Published 2025-01-01“…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
Get full text
Article -
3579
Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network
Published 2025-01-01“…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
Get full text
Article -
3580
Differentiable architecture search-based automatic modulation recognition for multi-carrier signals
Published 2024-09-01“…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
Get full text
Article