-
521
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Published 2024-12-01“… Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. …”
Get full text
Article -
522
Blasting Vibration Control Using an Improved Artificial Neural Network in the Ashele Copper Mine
Published 2021-01-01“…Blasting is currently the most important method for rock fragmentation in metal mines. …”
Get full text
Article -
523
Modern approaches for management patients with craniofacial tumors (literature review)
Published 2024-12-01“…An immediate observation that follows the realization of the practical significance of a surgical treatment algorithm common to all physicians and mid-level medical staff is that the most effective achievement of the above task lies in learning from one’s own mistakes during patient care. …”
Get full text
Article -
524
AI-Driven Predictive Maintenance for Workforce and Service Optimization in the Automotive Sector
Published 2025-06-01“…However, conventional approaches frequently do not successfully forecast which clients are most likely to need or utilize maintenance services. …”
Get full text
Article -
525
Comparative analysis of software optimization methods in context of branch predication on GPUs
Published 2021-12-01“…Covered approaches include: optimizing compilers, JIT-compilation, branch predictor, speculative execution, adaptive optimization, run-time algorithm specialization, profile-guided optimization. …”
Get full text
Article -
526
Radial Basis Function Coupling with Metaheuristic Algorithms for Estimating the Compressive Strength and Slump of High-Performance Concrete
Published 2024-12-01“…The contribution in this paper proposes the following: the radial basis function (RBF) model will be enhanced by using two optimization algorithms, namely Horse Herd Optimization (HHO) and Wild Geese Algorithm (WGA). …”
Get full text
Article -
527
An improved bistable stochastic resonance method and its application in early bearing fault diagnosis
Published 2025-07-01“…Additionally, the cuckoo search (CS) algorithm is used to optimize the potential function parameters, enhancing fault diagnosis performance. …”
Get full text
Article -
528
Acute severe ulcerative colitis: using JAK-STAT inhibitors for improved clinical outcomes
Published 2024-11-01“…Here we discuss methods to optimize the dosing of IFX to maximize its efficacy, while exploring recent work done on the safety and efficacy of JAK-STAT inhibitors as a salvage therapy, therefore suggesting a novel treatment algorithm to improve clinical outcomes in medically managed ASUC patients.…”
Get full text
Article -
529
A location-constrained crowdsensing task allocation method for improving user satisfaction
Published 2019-10-01Get full text
Article -
530
Enhancing LoRaWAN Performance Using Boosting Machine Learning Algorithms Under Environmental Variations
Published 2025-06-01“…Bayesian Optimization was applied to fine-tune hyperparameters to improve model accuracy. …”
Get full text
Article -
531
Robust Adaptive Path Tracking Control Scheme for Safe Autonomous Driving via Predicted Interval Algorithm
Published 2022-01-01Get full text
Article -
532
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
533
Optimization of microwave components using machine learning and rapid sensitivity analysis
Published 2024-12-01“…On the other hand, the most widely used nature-inspired algorithms require large numbers of system simulations to yield a satisfactory design. …”
Get full text
Article -
534
Selective opposition based constrained barnacle mating optimization: Theory and applications
Published 2024-12-01“…In addition to increasing efficiency by cutting down on wasted time spent exploring, this also increases the likelihood of stumbling onto optimal solutions. After that, it is put through its paces in a real-world case study, where it proves to be superior to the most cutting-edge algorithms available.…”
Get full text
Article -
535
Courier Assignment and Routing Problem Algorithm in Online Food Delivery System with Multi-Customer Delivery Patterns
Published 2025-03-01“…After processing and analyzing the numerical data, the study identified the most effective scenario that led to improved delivery times and benefits for couriers, enabling them to manage more orders and achieve faster delivery compared to existing algorithms. …”
Get full text
Article -
536
Smallest-Small-World Cellular Harmony Search for Optimization of Unconstrained Benchmark Problems
Published 2013-01-01“…Harmony search has successfully been applied to a wide variety of practical optimization problems. Most of the previous researches have sought to improve the performance of the HS algorithm by changing the pitch adjusting rate and harmony memory considering rate. …”
Get full text
Article -
537
Machine Learning Innovations for Improving Mineral Recovery and Processing: A Comprehensive Review*
Published 2024-12-01Get full text
Article -
538
Dynamically Dimensioned Search Grey Wolf Optimizer Based on Positional Interaction Information
Published 2019-01-01“…The comparison results for the 23 benchmark functions show that the proposed DGWO algorithm performs significantly better than the GWO and its improved variant for most benchmarks. …”
Get full text
Article -
539
A Wi-Fi RSS-RTT Indoor Positioning Model Based on Dynamic Model Switching Algorithm
Published 2024-01-01“…However, their performance varies significantly across different indoor environments, making it challenging to identify the most suitable system for all scenarios. To address this challenge, we propose an algorithm that dynamically selects the most optimal Wi-Fi positioning model for each location. …”
Get full text
Article -
540
Improved Asphalt Pavement Crack Detection Model Based on Shuffle Attention and Feature Fusion
Published 2025-01-01“…However, traditional methods for crack detection often suffer from low efficiency and limited accuracy, necessitating improvements in the accuracy of existing crack detection algorithms. …”
Get full text
Article