-
401
DMCM: Dwo-branch multilevel feature fusion with cross-attention mechanism for infrared and visible image fusion.
Published 2025-01-01“…The experimental results demonstrate that the proposed method outperforms other algorithms in both subjective and objective evaluation results. …”
Get full text
Article -
402
A New Method Calculating Stresses and Displacements in Elastic Bars
Published 1987-12-01“…The algorithm is based on Vlasov's shell theory. The differential equations derived are solved numerically by means of the method of splines. …”
Get full text
Article -
403
Prediction Model for Compaction Quality of Earth-Rock Dams Based on IFA-RF Model
Published 2025-04-01“…The method utilizes a dynamic inertia weight, an adaptive factor, and a differential evolution strategy to enhance the search capability of the firefly algorithm. …”
Get full text
Article -
404
Kinematic Performance Analysis and Dimensional Optimization for 2PUS-PU Parallel Mechanism
Published 2020-12-01“…A constrained optimization model is constructed to formulate the design problem of dimensional parameters on the maximizing radius of RTOW,and particle swarm optimization and differential evolution algorithm are adopted to solve this problem. …”
Get full text
Article -
405
METAHEURISTIC OPTIMIZATION METHODS FOR PARAMETERS ESTIMATION OF DYNAMIC SYSTEMS
Published 2017-05-01“…The article considers the usage of metaheuristic methods of constrained global optimization: “Big Bang - Big Crunch”, “Fireworks Algorithm”, “Grenade Explosion Method” in parameters of dynamic systems estimation, described with algebraic-differential equations. …”
Get full text
Article -
406
KFCM-PSOTD : An Imputation Technique for Missing Values in Incomplete Data Classification
Published 2024-05-01“…The outcomes demonstrate that the KFCM-PSOTD algorithm has a better performance; even the difference in evaluation scores obtained reaches 10% better than other imputation techniques.…”
Get full text
Article -
407
Adaptive dynamic programming-based multi-fault tolerant control of reconfigurable manipulator with input constraint
Published 2024-08-01“…Then, an evaluation neural network (NN) is established and the Hamilton–Jacobi–Bellman (HJB) equation is solved by online strategy iterative algorithm. …”
Get full text
Article -
408
Fractional-Order Adaptive P-Laplace Equation-Based Art Image Edge Detection
Published 2021-01-01“…By comparing with other algorithms, the image edge detection effect is measured with the help of evaluation metrics such as peak signal-to-noise ratio and structural similarity, and the optimal value is selected iteratively so that the image with the best edge detection result is retained. …”
Get full text
Article -
409
Calibration and surrogate model-based sensitivity analysis of crystal plasticity finite element models
Published 2024-11-01“…Comparison of the Nelder-Mead and differential evolution algorithms demonstrated that only the differential evolution algorithm was able to reliably find the global optimum due to the presence of local minima in the calibration objective function. …”
Get full text
Article -
410
Prediction of Drifter Trajectory Using Evolutionary Computation
Published 2018-01-01“…In contrast to existing numerical models that use the Lagrangian method, we used an optimization algorithm to predict the trajectory. As the evaluation measure, a method that gives a better score as the Mean Absolute Error (MAE) when the difference between the predicted position in time and the actual position is lower and the Normalized Cumulative Lagrangian Separation (NCLS), which is widely used as a trajectory evaluation method of drifters, were used. …”
Get full text
Article -
411
Automated Detection of Central Retinal Artery Occlusion Using OCT Imaging via Explainable Deep Learning
Published 2025-03-01“…Conclusions: Our machine learning algorithm (MLA) exhibited a high AUC, as well as sensitivity and specificity in detecting CRAO and the differential classes, respectively. …”
Get full text
Article -
412
QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption
Published 2024-12-01“…The proposed work generates the S-box optimized values in a dynamic way, and an experimental evaluation of the proposed S-box method has been conducted using several cryptographic criteria, including bit independence criteria, speed, non-linearity, differential and linear approximation probabilities, strict avalanche criteria and balanced output. …”
Get full text
Article -
413
An Effective ABC-SVM Approach for Surface Roughness Prediction in Manufacturing Processes
Published 2019-01-01“…Further, to evaluate the optimization performance of ABC in parameters determination of SVM, this study compares the prediction performance of SVM models optimized by well-known evolutionary and swarm-based algorithms (differential evolution (DE), genetic algorithm (GA), particle swarm optimization (PSO), and ABC) and analyzes ability of these optimization algorithms from their optimization mechanism and convergence speed based on experimental datasets of turning and milling. …”
Get full text
Article -
414
An Electrochemical/Thermodynamic Analytical Model for Hard‐Pack Lithium‐Ion Batteries in Engineering Education
Published 2025-02-01“…The paper elucidates the mechanisms of electrochemical/thermodynamic behavior evolution in lithium‐ion batteries under thermal abuse and develops a state evaluation model based on ordinary differential equations. …”
Get full text
Article -
415
ENCRYPTION OF IMAGES ON THE BASIS OF CHAOTIC MAPPING AND PARALLEL COMPUTING
Published 2017-12-01“…Resistance of this algorithm to statistical and differential cryptanalysis was evaluated. …”
Get full text
Article -
416
Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps
Published 2025-07-01“…In our study, we provide a systematic CPA of the elementary algorithm, confirmed using experimental evaluation. …”
Get full text
Article -
417
Postoperative outcome analysis of chronic rhinosinusitis using transfer learning with pre-trained foundation models based on endoscopic images: a multicenter, observational study
Published 2025-07-01“…Conclusion The transfer learning algorithm model based on pre-trained foundation models can provide accurate and reproducible analysis of postoperative outcomes in CRS, effectively addressing the issue of high subjectivity in postoperative evaluation. …”
Get full text
Article -
418
Service Composition and Optimal Selection for Industrial Software Integration with QoS and Availability
Published 2025-07-01“…To efficiently solve the proposed model, a hybrid enhanced multi-objective Gray Wolf Optimizer (HEMOGWO) was developed. This algorithm integrated Tent chaotic mapping and a Levy flight-enhanced differential evolution (DE) strategy. …”
Get full text
Article -
419
Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study
Published 2025-06-01“… Implementation-level countermeasures like masking can be applied to any cryptographic algorithm in order to mitigate Differential Power Analysis (DPA). …”
Get full text
Article -
420
Implementation of MS Circle Map in Digital Image Encryption
Published 2025-06-01“…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
Get full text
Article