-
5981
A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security
Published 2024-10-01“…While Grover’s algorithm presents a comparatively lesser threat to symmetric encryption, it still accelerates key search processes, creating potential vulnerabilities. …”
Get full text
Article -
5982
Schur Complement Optimized Iterative EKF for Visual–Inertial Odometry in Autonomous Vehicles
Published 2025-07-01“…The experimental results show that the algorithm achieves superior state estimation performance on several typical visual–inertial datasets, demonstrating excellent accuracy and robustness.…”
Get full text
Article -
5983
Design and Implementation of Hybrid GA-PSO-Based Harmonic Mitigation Technique for Modified Packed U-Cell Inverters
Published 2024-12-01“…By utilizing the multi-objective optimization method, the approach minimizes THD while keeping voltage and efficiency constraints. …”
Get full text
Article -
5984
Lightweight UAV Detection Method Based on IASL-YOLO
Published 2025-04-01“…To address this, we propose the IASL-YOLO algorithm, which optimizes the YOLOv8s model to enhance detection accuracy and lightweight efficiency. …”
Get full text
Article -
5985
Modeling random processes induced by the support surface profile in transport and technological systems
Published 2023-09-01“…The adequacy of the algorithm has been confirmed through a comprehensive analysis of at least 50 implementations, highlighting its effectiveness and reliability.…”
Get full text
Article -
5986
CONTENT-ANALYSIS OF THE RUSSIAN MARKET OF SELECTIVE α2-ADRENOMIMETIC MEDICINAL DRUGS, APPLIED IN THERAPY OF RHINITIS OF DIFFERENT ETIOLOGY
Published 2017-05-01“…Followed by the results of thestudies we have obtained the date which can be used while developing the principlesand algorithm of pharmaceutical consulting, as well as for formation of rationalrange of selective α2-adrenomimetic medicinal drugs, applied for therapy of rhinitis ofdifferent etiology.…”
Get full text
Article -
5987
Multi-scale eddy identification and analysis based on deep learning method and ocean color data
Published 2025-08-01“…In this study, we proposed a multi-scale eddy detection neural network algorithm (MED-Net) for eddy identification and segmentation task in chlorophyll fields. …”
Get full text
Article -
5988
ICSO: A Novel Hybrid Evolutionary Approach with Crisscross and Perturbation Mechanisms for Optimizing Generative Adversarial Network Latent Space
Published 2025-05-01“…The ICSO algorithm treats the quality and diversity as separate objectives, balancing them through a normalization strategy, while a gradient regularization term (i.e., GP) is introduced into the discriminator’s objective function to stabilize training and mitigate gradient-related issues. …”
Get full text
Article -
5989
Application of Deep Learning to Identify Flutter Flight Testing Signals Parameters and Analysis of Real F-18 Flutter Flight Test Data
Published 2025-01-01“…Deep learning algorithms demonstrate substantial accuracy and robustness, providing reliable parameter identification for flutter analysis while significantly reducing the time spent near flutter conditions. …”
Get full text
Article -
5990
Multivisit Drone-Vehicle Routing Problem with Simultaneous Pickup and Delivery considering No-Fly Zones
Published 2023-01-01“…Given the intricacy of the MILP model, we propose a two-stage heuristic algorithm based on a simulated annealing approach, combined with strategies for rectifying infeasible solutions and expediting algorithmic processes. …”
Get full text
Article -
5991
Dynamic Sensor-Based Data Management Optimization Strategy of Edge Artificial Intelligence Model for Intelligent Transportation System
Published 2025-03-01“…Experimental results show that while maintaining the same recall rate, the inference time is reduced to one tenth or even one twentieth of the original time. …”
Get full text
Article -
5992
Analysis of information flow security using software implementing business logic based on stored database program blocks
Published 2024-04-01“…The technology is presented as a step-by-step approach to resolving specific tasks, including the following: designing a database (DB) for storing and processing sensitive information; analyzing dependencies and identifying relevant sets of program blocks in the DB; generating TLA+ specifications for the identified program blocks; labeling specifications according to global security policy rules and additional constraints; applying the specification verification algorithm, and resolving security violations while providing recommendations for software developers. …”
Get full text
Article -
5993
Introducing a Novel Method for Determining the Future Price of the Financial Markets: A Case Study of the Hang Seng Index
Published 2024-12-01“…Grey Wolf Optimization, Slime Mold Algorithm, and Genetic Algorithm are the optimization techniques included in this study. …”
Get full text
Article -
5994
ZNN-Based Gait Optimization for Humanoid Robots with ALIP and Inequality Constraints
Published 2025-03-01“…The results demonstrate that, compared to the absence of an optimization strategy, the proposed algorithm can effectively prevent overshoot and approximate energy-efficient responses caused by large variations in angular momentum.…”
Get full text
Article -
5995
A Novel Framework for Automated Grid Generation and CFD Simulation of Complex Geometries
Published 2024-11-01“…This framework integrated body-fitted grids that accommodate intersecting grid lines, the flexible-node finite difference method (FN-FDM) designed for unordered point clouds, and a universal algorithm for freestream preservation (discrete equivalence equation and its discrete rule, DEER). …”
Get full text
Article -
5996
Collision Detection and Reaction for Quadrotors Using Encoder-Integrated Tombo Propellers
Published 2025-01-01“…A collision detection algorithm based on this phenomenon successfully identifies eight out of twelve collisions during hover flights, while the remaining four minor collisions, which were undetected, had negligible effects on quadrotor stability. …”
Get full text
Article -
5997
An Investigation of Extended-Dimension Embedded CKF-SLAM Based on the Akaike Information Criterion
Published 2024-12-01“…Furthermore, the system noise is embedded into the state variables, and an embedding volume criterion is used to improve the conventional CKF while extending the dimensionality. Finally, the proposed algorithm was validated and analyzed through both simulations and real-world experiments. …”
Get full text
Article -
5998
A Complex Network Approach for Quantitative Characterization and Robustness Analysis of Sandstone Pore Network Structure
Published 2021-01-01“…Then, in view of the problem, which is difficult to quantify the detailed topological structure of the sandstone pore networks in the previous study, the new complex network theory is used to characterize the pore structure. PageRank algorithm is based on the number of connections between targets as a measure index to rank the targets, so the network degree distribution, average path length, clustering coefficient, and robustness based on PageRank algorithm and permeability-related topological parameters are studied. …”
Get full text
Article -
5999
Multisensor Fused Fault Diagnosis for Rotation Machinery Based on Supervised Second-Order Tensor Locality Preserving Projection and Weighted k-Nearest Neighbor Classifier under Ass...
Published 2016-01-01“…Second-order tensor representation of multisensor fused conditional features is employed to replace the prevailing vector description of features from a single sensor. Then, an SSTLPP algorithm under AMDM (SSTLPP-AMDM) is presented to realize dimensional reduction of original high-dimensional feature tensor. …”
Get full text
Article -
6000
A Swarm-Based Multi-Objective Framework for Lightweight and Real-Time IoT Intrusion Detection
Published 2025-08-01“…MOOIDS-IoT combines a Genetic Algorithm (GA)-based feature selection technique with a multi-objective Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Article