-
441
Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems
Published 2025-06-01“…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
Get full text
Article -
442
Investigation of the Pulmonary Artery Hypertension Using an Ad Hoc OpenFOAM CFD Solver
Published 2024-12-01“…The analysis of the data confirmed the importance of CFD as a supportive tool in understanding, diagnosing, and monitoring the pathophysiological mechanisms underlying cardiovascular diseases, proving to be a powerful means for personalizing surgical treatments.…”
Get full text
Article -
443
-
444
On а Recursive-Parallel Algorithm for Solving the Knapsack Problem
Published 2018-04-01“…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
Get full text
Article -
445
Digital augmentation of aftercare for patients with anorexia nervosa: the TRIANGLE RCT and economic evaluation
Published 2025-07-01“…The specific aims were to assess: patient distress at 12 months (primary outcome) other patient outcomes, including patient distress at 18 months, patient motivation and ability to change, eating disorder symptoms, social and work adjustment, and days in hospital cost-effectiveness of ECHOMANTRA for patients at 12 months carer distress and skills at 12 and 18 months adverse events (AEs) during the study process aspects of the study, including adherence to treatment and patients and their carer/supporters’ experiences of receiving and supporting treatment, respectively, in the trial by conducting nested qualitative studies and online surveys about both treatment as usual (TAU) alone and with ECHOMANTRA augmentation. …”
Get full text
Article -
446
-
447
A lightweight speaker verification approach for autonomous vehicles
Published 2024-12-01Get full text
Article -
448
A Cross-Chain Solution to Connect Multiple DNS Blockchains in Consensus Roots System
Published 2025-07-01Get full text
Article -
449
Are queries and keys always relevant? A case study on transformer wave functions
Published 2025-01-01“…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
Get full text
Article -
450
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
451
-
452
Identification of unknown operating system type of Internet of Things terminal device based on RIPPER
Published 2018-10-01“…Also, it is compared with the existing support vector machine and C45 decision tree classification algorithms. …”
Get full text
Article -
453
Finding Transcription Factor Binding Motifs for Coregulated Genes by Combining Sequence Overrepresentation with Cross-Species Conservation
Published 2012-01-01“…Novel computational methods for finding transcription factor binding motifs have long been sought due to tedious work of experimentally identifying them. …”
Get full text
Article -
454
Data-driven joint routing, topology, and mobility design for FANET systems using a digital twin approach
Published 2025-01-01Get full text
Article -
455
-
456
-
457
A Heavy-Haul Railway Corrugation Diagnosis Method Based on WPD-ASTFT and SVM
Published 2022-01-01“…The training and testing samples are classified using Support Vector Machine (SVM). The adaptive short-time Fourier transform (ASTFT) is incorporated with the Renyi entropy and the particle swarm optimization algorithm, which achieves a better aggregation of the time-frequency distribution and reduces the computation cost. …”
Get full text
Article -
458
A data driven predictive viscosity model for the microemulsion phase
Published 2025-04-01“…Support Vector Regression (SVR) outperformed other models with an R2 of 0.978 and 0.963 and mean absolute errors of 0.059 and 0.072 for training and test datasets, respectively. …”
Get full text
Article -
459
Prevalence and spatial distributions of trachomatous inflammation-follicular among children aged 1–9 years in rural areas of Yilmana Densa and Gonji Kolela districts, Northwestern...
Published 2025-08-01“…The results of the study may be used to support the current trachoma control and elimination program, and to help achieve SDG Goal 3 target 3.3 and Goal 6. …”
Get full text
Article -
460
Design model of thrust bearing with porous coating on the way surface
Published 2017-10-01“…The development of the design model of a thrust sliding bearing with a two-layer porous coating on the way surface running on an electrically conductive lubricant is described. The work objectives are the development and computational justification of the possible increase in oil consumption, growth of the bearing capacity, and reduction of the frictional force, due to their design models refinement. …”
Get full text
Article