-
801
Identifying chaotic dynamics in nonuniformly dissipative and conservative dynamical systems from the varying divergence
Published 2025-07-01“…We evaluate the performance of the algorithm in various systems: the typical Rossler system, a three-neuron Hopfield neural network, the Pernarowski model of pancreatic beta-cells, and the Sprott D conservative system. …”
Get full text
Article -
802
Tri-objective parallel machine with job splitting and sequence dependent setup times using differential evolution and particle swarm optimization
Published 2024-12-01“…And for the large instances, DE algorithm offers superior performances compared to those of PSO algorithm, having significantly higher values of the hypervolume indicator.…”
Get full text
Article -
803
A Bi-Objective Model for the Location and Optimization Configuration of Kitchen Waste Transfer Stations
Published 2024-12-01“…Since the implementation of China’s mandatory waste sorting policy, the recycling of kitchen waste has become one of the core tasks of waste classification. …”
Get full text
Article -
804
Fast segment anything model applied in a low-cost camera-based system for oyster growth monitoring
Published 2024-12-01“…Furthermore, the width and height have standard deviations of 0.6 and 0.3 mm, respectively, indicating low data dispersion and good repeatability of the algorithm. Since the accuracy of the human eye in estimating a dimension without the aid of a distance measuring instrument tends to be lower than that obtained by the proposed tool, it is believed that the approach can significantly contribute to the management of oyster farm production, providing strategic insights based on animal growth for producers.…”
Get full text
Article -
805
A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing
Published 2013-01-01“…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
Get full text
Article -
806
Tencent Meeting forensics based on memory reverse analysis
Published 2025-06-01“…First, by analyzing the process storage and metadata format of Tencent Meeting in memory, an inverse metadata extraction algorithm is designed. Then, by analyzing the data structure of Tencent Meeting in memory, a meeting data stream engraving algorithm is developed. …”
Get full text
Article -
807
Secure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKOR
Published 2025-03-01“…The proposed model surpasses both CNN-based mechanisms by 94.7%, Shamir’s Secret Sharing Algorithm by 90.7%, and the Blowfish Algorithm by 82.3%. …”
Get full text
Article -
808
On optimum multi‐input multi‐output radar signal design: Ambiguity function, manifold structure and duration‐bandwidth
Published 2021-02-01“…Comparing the designs using ED and RD, we find that the convergence of the algorithm can be significantly faster when optimising over the manifold (RD) than when optimising over the whole space (ED). …”
Get full text
Article -
809
Combining and congruence evaluation of phylogenetic signals from different genes based on geometric approach
Published 2017-02-01“…A new Euclidean distance based algorithm is used for analysis of congruence and combining molecular genetic data. …”
Get full text
Article -
810
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
811
Towards Optimizing the Downlink Transmit Power in UAV-Integrated IRS Wireless Systems
Published 2025-04-01“…Simulation results demonstrate that the proposed SCA algorithm provides an efficient transmit power minimization approach with low computational complexity for large IRS since it achieves close-to-optimal performance, and significantly outperforms conventional systems without IRS. …”
Get full text
Article -
812
Bats of a feather: Range characteristics and wing morphology predict phylogeographic breaks in volant vertebrates
Published 2025-04-01“…Monmonier’s maximum differences algorithm can be employed to estimate phylogeographic breaks using georeferenced sequence data. …”
Get full text
Article -
813
Linear Continuous-Time Regression and Dequantizer for Lithium-Ion Battery Cells with Compromised Measurement Quality
Published 2025-02-01“…The parameters have low sensitivity to measurement noise since they are continuous-time. Sensitivity analyses confirm the algorithms’ suitability for battery management across various Gaussian measurement noise, accuracy, time constants and state-of-charge (SoC), using evaluation metrics like root-mean-square-error (RMSE) (<2 mV), relative time constant errors, and steady-state error. …”
Get full text
Article -
814
Possibilities of magnet-resonance tomography usage while examining patients with reccurent genital prolapse
Published 2013-06-01“…The developed algorithm of dynamic magnetic resonance imaging in patients with recurrent pelvic hernia significantly improves the quality of diagnosis. …”
Get full text
Article -
815
Multitemporal Analysis of Seagrass Dynamics on Derawan Island (2003–2021) Using Remote Sensing Techniques
Published 2024-03-01“…Data were collected via field surveys using the photo transect method, and the benthic habitat map was created using Landsat 8 OLI Imagery, applying the Lyzenga water column correction algorithm and unsupervised classification method. The Normalized Difference Building Index (NDBI) algorithm and land digitization were utilized to track the development of the inns and jetties, revealing a rapid, widespread increase in construction throughout the island's southern region (R-square = 0.59). …”
Get full text
Article -
816
Anisotropic metric-based mesh adaptation for ice flow modelling in Firedrake
Published 2025-07-01“…Since the fixed-point algorithms require that the problem is solved multiple times, the reported reduction in the number of vertices ultimately translates into a 3–6 times lower overall computational cost compared to uniform mesh simulations.…”
Get full text
Article -
817
Analysis of two decades of Landsat satellite images reveals long-term changes in aquatic and terrestrial vegetation in Bimini, The Bahamas with coastal development
Published 2025-01-01“…Geological Survey (USGS) Landsat satellite suite have captured imagery since 1984, allowing for long-term mapping to quantify habitat change. …”
Get full text
Article -
818
Information support for decision making in problem situation description
Published 2021-12-01“…The relevance of the problem is associated with the need to collect and process significant amounts of information, since in the presence of a large number of factors, a person's capabilities are often insufficient to search and organize the necessary information.When solving the problem of user information support at the stage of describing the problem situation, three main goals are pursued: building a mathematical model of the corresponding processes; formalization of the set of basic concepts of the model; development of the algorithms for implementation of user interaction with the information system.Methods. …”
Get full text
Article -
819
THE OBJECTIFICATION OF THE PRINCIPLE OF FAIRNESS IN TAX LAW OF RUSSIA IN THE ASPECT OF ANALYSIS OF RECENT LEGISLATIVE DEVELOPMENTS
Published 2021-09-01“…We also analyzed the modified algorithm of taxation of citizens' property and noted the problems of its practical approbation. …”
Get full text
Article -
820
The Morphological Description Automation of the Optic Nerve Head Boundary in Digital Fundus Images
Published 2018-10-01“…The proposed method is based on integration algorithm of luminance samples along the diagonal. …”
Get full text
Article