-
521
The Gag City Grammar Police: Language and Algorithmic Community on Stan Twitter
Published 2025-08-01“…Through digital ethnographic observation of nonstandard English use on Twitter, I argue that Barbz--Nicki Minaj stans––discourage their posts from spreading to the general public. Working with the algorithm’s composition of social media feeds, Barbz use language to conceal themselves while remaining discoverable. …”
Get full text
Article -
522
Competition law in the age of AI: Confronting algorithmic collusion in the smart economy
Published 2025-03-01“…While EU case law provides some regulatory guidance, it often falls short in addressing the unique nature of algorithmic collusion. …”
Get full text
Article -
523
Application of Blocplan and Aldep Algorithms for Optimizing Production Layout at Meatball Factory
Published 2025-06-01“…The purpose of this study is to minimize material handling costs while increasing productivity through improved design of meatball production facilities, analyze the sensitivity of layout changes, and compare the efficiency of the Blocplan algorithm and the Aldep algorithm in solving problems in meatball production by considering uncertainty. …”
Get full text
Article -
524
A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence
Published 2019-10-01“…The outer iteration calculates the Jacobian matrix based on Newton-Raphson method, while the inner iteration uses the distributed algorithm to solve power flow correction equation for each partitioned area of interconnected power system. …”
Get full text
Article -
525
Modification of the genetic algorithm for comprehensive topological optimization of the synchronous motors rotor
Published 2021-07-01“…Asynchronous motors have developed resource rational energy efficiency, while synchronous motors are more energy efficient without modifications. …”
Get full text
Article -
526
A Review on Automated Detection and Identification Algorithms for Highway Pavement Distress
Published 2025-05-01Get full text
Article -
527
Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset
Published 2012-12-01“…<span>Many real world problems involve the simultaneous optimization of various and often conflicting objectives. Evolutionary algorithms seem to be the most attractive approaches for this class of problems, because they are usually population based techniques that can find multiple compromise solution in a single run, and they do not require any hypotheses on the objective functions. …”
Get full text
Article -
528
Inverse versus convolution treatment planning algorithms for gamma knife radiosurgery
Published 2024-09-01“…The neurosurgeon prescribed the dose depending on the tumour volume and type, while the medical physicist generated the two plans based on inverse and convolution algorithms. …”
Get full text
Article -
529
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Published 2023-12-01“…The proposed genetic algorithm-based ECC-key generation process involves several stages: chromosome initialization, fitness evaluation, selection, uniform crossover, and mutation. …”
Get full text
Article -
530
An enhanced YOLOv8‐based bolt detection algorithm for transmission line
Published 2024-12-01“…The improved algorithm improves the accuracy of the bolt detection while reducing the computation complexity to achieve more lightweight model.…”
Get full text
Article -
531
Quantifying the Impact of Environmental Factors on the Methane Point-Source Emission Algorithm
Published 2025-02-01“…The results offer critical insights for refining CH<sub>4</sub> detection algorithms and enhancing the precision of satellite-based inversions for low-concentration CH<sub>4</sub> point-source emissions.…”
Get full text
Article -
532
Audio Watermarking Algorithm Against Speed Attack based on Amplitude Rearrangement
Published 2025-05-01“…[Results] Experimental results show that the algorithm can improve the robustness against speed-up attacks while maintaining the imperceptibility of audio watermarking, with an average bit error rate less than 0.02.…”
Get full text
Article -
533
EG-DPoS: Optimized DPoS Consensus Algorithm Based on Evolutionary Game
Published 2025-05-01“…The proportional coefficient of credit value and voting weight in the process of agent node election is balanced to reduce the oligopoly phenomenon caused by nodes with high credit value, while the roulette selection algorithm is used to randomize the block generation order of agent nodes, to avoid nodes being attacked during block generation and improve the security of the system. …”
Get full text
Article -
534
Comparing variable neighbourhood search algorithms for the direct aperture optimisation in radiotherapy
Published 2025-08-01“…This approach allows for a more thorough solution for space exploration while maintaining computational efficiency. The rVNS, unlike traditional VNS algorithms, does not require any transition rule, as it integrates a set of predefined neighbourhood moves at each iteration. …”
Get full text
Article -
535
Research on Algorithms for Local Robot Positioning Using Methods of Discrete Optimization
Published 2025-06-01“…The purpose of the article study is to develop an algorithm for the local positioning system of a small collective of robots to maintain a stable structure during group movement while executing tasks in three-dimensional conditions. …”
Get full text
Article -
536
A Temperature Field Based Routing Algorithm in Content-Centric Networking
Published 2015-12-01“…Simulation results show that TFBR can adequately utilize the cache in CCN nodes and decrease the network average delay while improving the performance of load balancing.…”
Get full text
Article -
537
Strong Convergence of Hybrid Algorithm for Asymptotically Nonexpansive Mappings in Hilbert Spaces
Published 2012-01-01“…The hybrid algorithms for constructing fixed points of nonlinear mappings have been studied extensively in recent years. …”
Get full text
Article -
538
Use of schedule theory algorithms for task planning and time management tasks
Published 2024-10-01“…At the moment, there are many algorithms for solving such tasks, but the algorithms must be customized to specific conditions, while ensuring the quality of the task and performance. …”
Get full text
Article -
539
Power control for successive interference cancellation algorithm based on game theory
Published 2015-09-01“…It was proved that implementation of successive interference cancellation could improve network throughput in wireless networks,while in order to maximize network throughput,it was a NP-Hard problem that how to control transmission power when successive interference cancellation was used in wireless networks.A non-cooperative game theory is proposed to solve power control between wireless nodes for successive interference cancellation,in which non-cooperative game theory model is proposed and Nash equilibrium is analyzed,and also the proposed algorithm can ob-tain good network throughput than others,simulations validate the results and demonstrate the superiority of the algorithm.…”
Get full text
Article -
540
FDR coding and decoding algorithm for reliable transmission in underwater acoustic network
Published 2020-04-01“…By analyzing the shortcomings of RLT coding and decoding algorithm,a filtering dimension reduction (FDR) algorithm was proposed,which eliminated the waiting time of the traditional decoding algorithm and achieves fast decoding.In addition,XOR operation between encoded packages effectively increased the number of one-degree encoded packages,and improved decoding probability while reducing transmission delay.An optimized degree distribution function for FDR decoding algorithm was proposed,which increased the proportion of two-degree,three-degree and four-degree encoded packages,further increased the probability of one-degree packet,so that speeded up the decoding progress.Simulation results with NS3 show that the decoding success probability of FDR algorithms higher than RLT algorithm.…”
Get full text
Article