-
681
Optimizing Vehicle Scheduling Based on Variable Timetable by Benders-and-Price Approach
Published 2019-01-01“…Moreover, the proposed algorithm is greatly superior to GUROBI in terms of computational efficiency and guarantees the quality of the solution.…”
Get full text
Article -
682
Management Decisions under Uncertainty Using Controlling Tools
Published 2023-04-01“…The results showed that there is no standard algorithm for the process of making managerial decisions in all universities in Kazakhstan. …”
Get full text
Article -
683
Synthesis of a Transfer Function With Real Poles From Tabulated Frequency Response Data for Transmission-Line Impedance Modeling
Published 2022-01-01“…This paper proposes an algorithm to synthesize a transfer function only with real poles from tabulated frequency response data for TL impedance modeling. …”
Get full text
Article -
684
Failure of affine‐based reconstruction attack in regenerating vascular feature points
Published 2021-09-01“…Affine‐based reconstruction attack is an inverse biometrics method that models the biometric recognition algorithm by an affine approximation. This type of attack reconstructs targeted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. …”
Get full text
Article -
685
Adaptive MCS selection and resource planning for energy-efficient communication in LTE-M based IoT sensing platform.
Published 2017-01-01“…Focusing on this circumstance, we propose a novel adaptive modulation and coding selection (AMCS) algorithm to address the energy consumption problem in the LTE-M based IoT-sensing platform. …”
Get full text
Article -
686
Scalable data assimilation with message passing
Published 2025-01-01“…In this article, we exploit the formulation of data assimilation as a Bayesian inference problem and apply a message-passing algorithm to solve the spatial inference problem. Since message passing is inherently based on local computations, this approach lends itself to parallel and distributed computation. …”
Get full text
Article -
687
Bridging IoT devices and machine learning for predicting power consumption: case study universitas Widya Dharma Pontianak
Published 2025-06-01“…Unlike traditional approaches that rely on the mean of samples within a leaf, our method incorporates their likelihood. Since RT algorithms are prone to overfitting, training each leaf individually is expected to mitigate this issue. …”
Get full text
Article -
688
Universal Single Controller for Solving Deadlock Problems of Flexible Manufacturing Systems
Published 2024-01-01“…Deadlocks are a drawback when simulating in a Petri net model (PNM). Since the occurrence of deadlocks can influence serial operations, it is crucial to overcome such problems. …”
Get full text
Article -
689
Graph attention networks based multi-agent path finding via temporal-spatial information aggregation.
Published 2025-01-01“…An effective Multi-Agent Path Finding (MAPF) algorithm must efficiently plan paths for multiple agents while adhering to constraints, ensuring safe navigation from start to goal. …”
Get full text
Article -
690
A Feature-Selective Independent Component Analysis Method for Functional MRI
Published 2007-01-01“…We also compare the task-related sources estimated from true fMRI data by a feature-selective ICA algorithm versus an ICA algorithm and show evidence that the feature-selective scheme helps improve the estimation of the sources in both spatial activation patterns and the time courses.…”
Get full text
Article -
691
Context-Aware Adaptation of Component-Based Systems: An Active Repository Approach
Published 2012-01-01“…The repository applies Fuzzy logic algorithm to evaluate the adequacy level of the components and GRASP algorithm to mount the new system architecture. …”
Get full text
Article -
692
A Unified Approach for the Identification of Wiener, Hammerstein, and Wiener–Hammerstein Models by Using WH-EA and Multistep Signals
Published 2020-01-01“…This approach is based on the use of multistep excitation signals and WH-EA (an evolutionary algorithm for Wiener–Hammerstein system identification). …”
Get full text
Article -
693
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
Published 2025-01-01“…Currently, there are limited datasets available for training the MAD algorithm due to privacy concerns and the challenges of obtaining and processing a large number of printed and scanned images. …”
Get full text
Article -
694
ANISOTROPIC REGULATOR OF DAMPING OF RANDOM VIBRATIONS OF THE MOBILE PLATFORM OF A BILAMENT VEHICLE APPARATUS
Published 2017-11-01“…Qualitative illustrations of the operability of the proposed algorithm and quantitative characteristics of the change in output signals are presented. …”
Get full text
Article -
695
Raynaud’s phenomenon in the rheumatologist’s practice
Published 2014-05-01“…This review focuses on pathogenesis, the algorithm of early and differential diagnosis of RP, and current approaches to therapy based on the analysis of the published and our own data.…”
Get full text
Article -
696
Predicting Weather Disruptions for the ICC Champions Trophy 2025 in Pakistan Using Machine Learning and Data Analytics
Published 2025-07-01“…Correct forecasting of the weather is crucial for outdoor sporting events to avoid cancellations and guarantee peak athlete performance since climate change has an increasing impact on weather patterns. …”
Get full text
Article -
697
An approach to forecast production profiles, oil-gas ratio and water contamination probabilistic assessment
Published 2024-10-01“…The variants of variables implementation were studied, the review of experimental designs and optimization algorithms was done. At the first step, the simulation model was history matched using Differential Evolution algorithm, since its initial version had problems with phase withdrawals and pressure dynamics. …”
Get full text
Article -
698
Enhancing education quality with hybrid clustering and evolutionary neural networks in a multi phase framework
Published 2025-07-01“…The NeuroEvoClass algorithm mixes evolutionary strategies inspired by swarm intelligence and artificial neural networks (ANN) to improve student performance prediction in Phase II. …”
Get full text
Article -
699
System Verification and FPGA Implementation of Hardware Preemptive Scheduler for RISC-V Processor
Published 2025-01-01“…The scientific contribution within this project is given by a dynamic scheduling algorithm implemented in hardware, support for resolving the priority inversion situations and the use of RISC-V ISA provided under open source licenses. …”
Get full text
Article -
700
Design a low-noise 5GHz wideband microwave power amplifier using 90nm CMOS technology with area reduction employing an active inductor
Published 2025-07-01“…In terms of achieving a balance between the results of noise and gain, we were unable to accomplish the essence of the design process through mathematical analysis. Since a satisfactory outcome cannot be achieved through mathematical analysis, we optimise using the genetic algorithm. …”
Get full text
Article