-
7061
An Inter-Regional Lateral Transshipment Model to Massive Relief Supplies with Deprivation Costs
Published 2025-07-01“…Specifically, JADE is employed in the first stage to allocate the volume of massive relief supplies, aiming to minimize deprivation costs, while IALNS optimizes intermodal routing in the second stage to minimize the weighted sum of transportation time and cost. …”
Get full text
Article -
7062
Optimization Techniques on Quantum and Classical Systems: A Comprehensive Comparative Study
Published 2025-01-01“…This study compares Particle Swarm Optimization (PSO), Moth Flame Optimization (MFO), and Genetic Algorithm (GA) on three platforms : a local computer, a local computer with quantum integration, and an IBM quantum machine. …”
Get full text
Article -
7063
Source Quantization and Coding over Noisy Channel Analysis
Published 2024-11-01“…., the channel decoding algorithm is employed to realize the lossy source coding. …”
Get full text
Article -
7064
Prediction of the spatial distribution of vine weevil under climate change using multiple variable selection methods
Published 2025-03-01“…This research developed multiple species distribution models (SDMs) using different variable selection methods, including correlation, biological considerations, and principal component analysis, and integrated them into an ensemble model to predict the pest’s distribution under climate change. The MaxEnt algorithm was used to develop the models, showing robust performance with raw bioclimatic variables (TSS 0.34–0.37, F1 score 0.60–0.67), while lower performance and different distribution patterns were observed with reconstructed variables (TSS 0.13, F1 score 0.48). …”
Get full text
Article -
7065
Enhancing security and usability with context aware multi-biometric fusion for continuous user authentication
Published 2025-08-01“…Keystroke dynamics are processed using Wavelet Transform Filtering (WTF) to improve feature extraction, while gait data is refined with an Autocorrelation (AC) Filter to ensure the use of reliable gait segments. …”
Get full text
Article -
7066
Towards carbon emission modeling and optimization for time-sensitive IIoT
Published 2025-03-01“…Based on this, considering low-latency constraints, a task offloading optimization algorithm based on the alternative direction method of multipliers (ADMM) was designed to minimize the overall carbon emissions of the considered IIoT system. …”
Get full text
Article -
7067
Doppler broadening of neutron elastic scattering cross section using SCLM(α,β) thermal scattering laws
Published 2025-01-01“…Despite works performed on 238U, no algorithm reported in the literature provides a unified Crystal Lattice Model valid below and above the thermal cutoff energy. …”
Get full text
Article -
7068
The close-open mixed-fleet electric vehicle routing problem
Published 2023-12-01“…To solve large instances, three discrete optimization swarm intelligence algorithms are employed, alongside a Variable Neighborhood Search algorithm. …”
Get full text
Article -
7069
Contribution of Daylighting to Saving Electrical Energy in Cameroon: Case Study of a Classroom in a Public School
Published 2025-01-01“…Applying the optimization algorithm designed for this purpose brings the average illuminance level down to 300lx following the EN12464 standard. …”
Get full text
Article -
7070
Research on image generation technology based on deep learning
Published 2025-01-01“…Based on the above problems, this paper analyzes the methods of improving and optimizing the mainstream image generation algorithm from the perspectives of improving and optimizing the loss function, improving the space modeling, revising the structure of both the generator and discriminator, while speeding up the training process. …”
Get full text
Article -
7071
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
7072
Supervised Clustering of Persian Handwritten Images
Published 2024-11-01“…Analyzing high-dimensional data, however, presents challenges, notably the curse of dimensionality. While various methods have been developed to address the dimensionality reduction, most overlooked the role of dependent variables. …”
Get full text
Article -
7073
Improved Hadamard Decomposition and Its Application in Data Compression in New-Type Power Systems
Published 2025-02-01“…The experimental results with simulated and field data demonstrate that the proposed scheme significantly reduces data volume while maintaining critical features in the restored data. …”
Get full text
Article -
7074
Krylov complexity in the Schrödinger field theory
Published 2025-03-01“…Our study reveals that the Lanczos coefficients {b n } are almost independent of the chemical potential, while {a n } are dependent on the chemical potential. …”
Get full text
Article -
7075
BEHAVIORAL SEGMENTATION OF CUSTOMERS: RFM MODEL AND K-MEANS APPLICATION
Published 2025-03-01“…Older customers spend the highest sums of money on lingerie products and the longest time since their last interaction with a company while young customers have the highest purchase frequency. …”
Get full text
Article -
7076
Characterize neuronal responses to natural movies in the mouse superior colliculus
Published 2025-03-01“…While artificial stimuli have been widely used in visual neuroscience and have significantly advanced our understanding of visual processing, they differ dramatically from the natural scenes that animals encounter in the wild. …”
Get full text
Article -
7077
A Dynamic Self-Adjusting System for Permanent Magnet Synchronous Motors Using an Improved Super-Twisting Sliding Mode Observer
Published 2025-06-01“…This method uses a neural network algorithm to balance chattering suppression with high control accuracy. …”
Get full text
Article -
7078
An optimal antibiotic selection framework for Sepsis patients using Artificial Intelligence
Published 2024-11-01“…OptAB performs an iterative optimal antibiotic selection for real-world Sepsis patients focussing on minimizing the Sepsis-related organ failure score (SOFA-Score) as treatment success while accounting for nephrotoxicity and hepatotoxicity as serious antibiotic side-effects. …”
Get full text
Article -
7079
Soft Actor-Critic Approach to Self-Adaptive Particle Swarm Optimisation
Published 2024-11-01“…Self-adaptive particle swarm optimisation (SAPSO) algorithms aim to adaptively adjust CPs during the optimisation process to improve performance, ideally while reducing the number of performance-sensitive parameters. …”
Get full text
Article -
7080
Modular quantum signal processing in many variables
Published 2025-06-01“…Despite significant advances in quantum algorithms, quantum programs in practice are often expressed at the circuit level, forgoing helpful structural abstractions common to their classical counterparts. …”
Get full text
Article