-
7061
Evaluation criteria of centralization options in the architecture of multicomputer systems with traps and baits
Published 2025-02-01“…Significant deviations in specific time intervals are addressed to achieve optimal centralization options.…”
Get full text
Article -
7062
Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET
Published 2025-03-01Get full text
Article -
7063
Resource Allocation and Interference Coordination Strategies in Heterogeneous Dual-Layer Satellite Networks
Published 2025-02-01“…We formulate a mathematical optimization problem to optimize resource allocation while minimizing co-channel interference and develop an ADMM-based distributed algorithm for efficient problem-solving. …”
Get full text
Article -
7064
Calibration and Uncertainty Analysis of Freundlich and Langmuir Isotherms Using the Markov Chain Monte Carlo (MCMC) Approach
Published 2024-10-01“…However, the Gibbs algorithm exhibited a higher convergence speed, making it suitable for scenarios where computational efficiency is a priority. …”
Get full text
Article -
7065
Identification of Spambots and Fake Followers on Social Network via Interpretable AI-Based Machine Learning
Published 2025-01-01Get full text
Article -
7066
Results of transgastric drainage of fluid collections and postnecrotic pancreas cysts in patients with acute pancreatitis
Published 2023-04-01“…Based on the analysis of the results of treatment of patients with postnecrotic pancreatic cysts and acute peripancreatic fluid collections, the data of multispiral computed tomography and endoscopic ultrasonography at the stages of cyst formation, options and optimal timing of endoscopic transgastric drainage were determined. …”
Get full text
Article -
7067
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article -
7068
-
7069
Exploration of Energy-Saving Chilling Landscape Design Based on Algo for Group Intelligence
Published 2022-01-01“…With the development of electronic computers, the previously unachievable optimization of engineering structures is now possible, while the traditional optimization methods cannot meet the requirements of modern computing due to the implementation constraints. …”
Get full text
Article -
7070
Ground truth clustering is not the optimum clustering
Published 2025-03-01“…Despite being NP-hard, solvers exist that can compute optimal solutions for small to medium-sized datasets. …”
Get full text
Article -
7071
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
7072
Model Predictive Control of Nonlinear System Based on GA-RBP Neural Network and Improved Gradient Descent Method
Published 2021-01-01“…A model predictive control (MPC) method based on recursive backpropagation (RBP) neural network and genetic algorithm (GA) is proposed for a class of nonlinear systems with time delays and uncertainties. …”
Get full text
Article -
7073
Does the COVID-19 pandemic affect the asset allocation performance? Evidence from a composite asset selection approach
Published 2025-08-01“…The proposed approaches in this study can be embedded in a computer as an asset allocation algorithm of Robo-advisers.…”
Get full text
Article -
7074
Adaptive Path Planning for Multi-UAV Systems in Dynamic 3D Environments: A Multi-Objective Framework
Published 2024-12-01“…This study evaluates and compares the computational performance and practical applicability of advanced path planning algorithms for Unmanned Aerial Vehicles (UAVs) in dynamic and obstacle-rich environments. …”
Get full text
Article -
7075
Fast Nonparametric Inference of Network Backbones for Weighted Graph Sparsification
Published 2025-07-01“…We then construct an efficient and provably optimal greedy algorithm to identify the backbone minimizing our objectives, whose run-time complexity is log-linear in the number of edges. …”
Get full text
Article -
7076
A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication
Published 2025-05-01“…To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. …”
Get full text
Article -
7077
PSO-Based Support Vector Machine with Cuckoo Search Technique for Clinical Disease Diagnoses
Published 2014-01-01Get full text
Article -
7078
Distribution Network Design for Fixed Lifetime Perishable Products: A Model and Solution Approach
Published 2013-01-01Get full text
Article -
7079
Single Machine Problem with Multi-Rate-Modifying Activities under a Time-Dependent Deterioration
Published 2013-01-01“…The computational experiments show that, for the situation with a rate-modifying activity, the proposed branch and bound algorithm can solve situations with 50 jobs within a reasonable time, and the heuristic algorithm can obtain the near-optimal solution with an error percentage less than 0.053 in a very short time. …”
Get full text
Article -
7080
Molecular subtype of recurrent implantation failure reveals distinct endometrial etiology of female infertility
Published 2025-07-01“…A molecular classifier (MetaRIF) was developed using the optimal F-score from 64 combinations of machine learning algorithms. …”
Get full text
Article