-
3601
Low power IoT device communication through hybrid AES-RSA encryption in MRA mode
Published 2025-04-01“…The enhanced RSA algorithm replaces the traditional dual-prime system with a triple-prime system, increasing the number of primes while reducing the bit length of each prime. …”
Get full text
Article -
3602
Enhanced flux potential analysis links changes in enzyme expression to metabolic flux
Published 2025-02-01“…Our approach outperforms alternatives by striking an optimal balance, evaluating enzyme expression at pathway level, rather than either single-reaction or whole-network levels.…”
Get full text
Article -
3603
Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants
Published 2022-01-01“…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
Get full text
Article -
3604
DETERMINATION OF TEMPERATURE-TIME PARAMETERS OF GROWING SINGLE CRYSTALS β-BaB<sub>2</sub>O<sub>4</sub> BY MODIFIED CZOCHRALSKI METHOD
Published 2019-06-01“…The aim of this work is to find of the mechanism the determination of optimal temperature-time mode of crystallization during the whole process of β-BaB2O4 crystal growth by modified Czochralski method. …”
Get full text
Article -
3605
Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot
Published 2018-01-01“…The result shows that the total mass of support frame after optimization is comparatively 48% less than before. At the same time,the inherent characteristic of the whole frame is obtained,which is prepared for the later control strategy.…”
Get full text
Article -
3606
Simulation and test study of transmission characteristics of V-shaped rubber belt CVT
Published 2025-06-01“…ObjectiveThe dynamic matching problem of continuously variable transmission (CVT) with the engine and Baja racing car was subjected to research analysis.MethodsThe parameters of key components of CVT were first optimized by genetic algorithm in Matlab software, then the dynamic modeling and simulation of CVT and the whole vehicle were carried out in Matlab/Simulink and RecurDyn, and finally the vehicle test was carried out on the chassis dynamometer.ResultsThe results of modeling simulation and vehicle test show that the dynamic index of Baja racing car is significantly improved after the optimization of the parameters of key components of CVT. …”
Get full text
Article -
3607
Detection of soluble solid content in table grapes during storage based on visible-near-infrared spectroscopy
Published 2025-01-01“…Comparing the modelling results derived from whole-band spectral data with those obtained from selected spectral variables, the optimal spectral prediction model was formulated utilizing PLSR. …”
Get full text
Article -
3608
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
3609
Assigning Priorities for Fixed Priority Preemption Threshold Scheduling
Published 2015-01-01“…This paper analyzes the inefficiency or nonoptimality of the previously proposed optimal priority assignment algorithms for PTS. We develop theorems for exhaustively but safely pruning infeasible priority orderings while assigning priorities to tasks for PTS. …”
Get full text
Article -
3610
Clustering-based energy-aware virtual network embedding
Published 2017-08-01“…Extensive simulations demonstrate that this algorithm significantly reduces the energy cost by up to 14% over the state-of-the-art algorithm while maintaining similar revenue.…”
Get full text
Article -
3611
Improving total bone marrow and lymphoid irradiation: feasibility of intensity-modulated proton therapy (IMPT) and dosimetric comparison with helical tomotherapy (HT)
Published 2025-05-01“…Dosimetric benefits were compared to HT, safety and accuracy were verified using an in-house algorithm and planar dosage measurement. Results The average cranio-caudal and lateral whole-body PTV dimensions were 169.24 cm and 46.41 cm for five adults; 95.2 cm and 28.86 cm for one pediatric patient. …”
Get full text
Article -
3612
Zero-shot classification with multi-model information interaction and its application in Mars exploration scenarios
Published 2025-05-01“…To address the issue that traditional Mars image classification methods based on images do not perform well in the face of the complex and unknown environment of Mars and the frequent occurrence of unseen categories, a zero-shot classification algorithm of multi-modal information interaction was studied and the migration and optimization of the algorithm to the field of deep space exploration was explored. …”
Get full text
Article -
3613
Angular Stabilization of a Multirotor Aircraft in Venus’ Atmosphere
Published 2025-07-01“…The developed stabilization algorithm can be applied to aerial vehicles operating in complex atmospheric conditions, including strong disturbances typical of the Venus cloud layer.…”
Get full text
Article -
3614
Improved sequence-based localization applied in coal mine
Published 2016-11-01“…Sequence–centroid localization contributes to improving this issue, but the location error on the boundary of whole area is unsatisfactory as well. This article proposes an improved sequence-based localization method which is integrated with quantum-behaved particle swarm optimization, as quantum-behaved particle swarm optimization makes good use of the search performance of global optimal solution. …”
Get full text
Article -
3615
3D Voxel-based Collaborative Path Planning for UAVs in Urban Emergency Response
Published 2025-08-01“…For local coverage, an improved Boustrophedon Cell Decomposition (BCD) algorithm is introduced, tailored for UAV operations, while global coverage is addressed through a multi-traveling salesman problem (MTSP) approach, optimized using the Jump Point Search (JPS) algorithm and Genetic Algorithm (GA). …”
Get full text
Article -
3616
Reconfigurable and Scalable Artificial Intelligence Acceleration Hardware Architecture With RISC-V CNN Coprocessor for Real-Time Seizure Detection
Published 2025-01-01“…This study proposes a seizure detection algorithm to identify a seizure attack with EEG. This algorithm includes a simplified signal preprocessor and a nearly optimized convolutional neural network (CNN). …”
Get full text
Article -
3617
Research on Hybrid Architecture Neural Networks for Time Series Prediction
Published 2025-01-01“…This multi-module collaborative architecture effectively processes multi-scale features of time series data while providing model interpretability. Through comparative analysis of various optimization algorithms’ convergence performance and prediction accuracy, this study found that the AdamW optimizer, with its effective weight decay mechanism and adaptive learning rate, demonstrated superior performance in training stability and generalization capability, with MSE and R2 metrics outperforming traditional optimizers. …”
Get full text
Article -
3618
An Effective Heuristic-Based Approach for Partitioning
Published 2013-01-01“…We note that the genetic algorithm has a strong global search capability, while the simulated annealing algorithm will fail in a local optimal solution easily. …”
Get full text
Article -
3619
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
3620
Research on High-Reliability Energy-Aware Scheduling Strategy for Heterogeneous Distributed Systems
Published 2025-06-01“…Second, to address the time-varying reliability characteristics introduced by DVFS, we propose a Fibonacci search-based dynamic frequency scaling algorithm (SEFFA). This algorithm effectively reduces energy consumption while ensuring task reliability, achieving sub-optimal processor energy adjustment. …”
Get full text
Article