-
481
Analysis Algorithm of Biomedical Signals in Remote Monitoring Systems of Human Health
Published 2023-03-01“…At the first stage, the main indicators (heart rate and human fall signal) are monitored. …”
Get full text
Article -
482
Smart System Resource Coordination Algorithm Based on 6G Technology
Published 2022-01-01“…Therefore, 6G technology will surely replace the current technology as the main means of future communication technology. This paper combines 6G technology to study the smart system resource coordination algorithm and analyzes the calculation process and actual effect of the algorithm. …”
Get full text
Article -
483
An encryption by using DNA algorithm for hiding a compressed message in Image
Published 2022-02-01“… Cryptography is a main item to generate confidence and empower services in the digital technology, while Steganography has vastly expanded in digital medias. …”
Get full text
Article -
484
The Implementation of Enhanced Microgrid using Mayfly Algorithm based PID Controller
Published 2025-02-01“… Micro grids, comprised of distributed generation units, are designed to function independently of the main grid. To ensure stable operation in isolated mode, precise control of system is essential. …”
Get full text
Article -
485
Genetic Algorithm Optimization for Determining Fuzzy Measures from Fuzzy Data
Published 2013-01-01“…Though there have existed some methodologies for solving this problem, such as genetic algorithms, gradient descent algorithms, neural networks, and particle swarm algorithm, it is hard to say which one is more appropriate and more feasible. …”
Get full text
Article -
486
Enhanced Retinal Vessel Detection Using Gradient Pyramid Fusion Algorithm
Published 2024-12-01“…The main goal of this study is to create an innovative approach to retinal vessel detection using the gradient pyramid fusion algorithm to improve edge continuity and measurement precision in retinal images. …”
Get full text
Article -
487
Algorithm of management of patients with acute cholestatic hepatitis (Clinical case presentation)
Published 2011-12-01“…To show diagnostic and treatment algorithm for patients with cholestatic syndrome by the example of clinical case.Features of clinical case. …”
Get full text
Article -
488
Routing algorithm for railway monitoring linear WSN based on improved PSO
Published 2022-05-01“…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
Get full text
Article -
489
Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks
Published 2010-07-01“…A main design challenge in the area of sensor networks is energy efficiency to prolong the network operable lifetime. …”
Get full text
Article -
490
Numerical algorithms to solve one inverse problem for Navier–Stokes equations
Published 2025-07-01“…An equivalent form of PDE problem is defined as the first-kind Volterra integral equation. The main aim is to analyze a possible ill-posedness of the given problem. …”
Get full text
Article -
491
Friendship links-based privacy-preserving algorithm against inference attacks
Published 2022-11-01“…Directly publishing the original data of social networks may compromise personal privacy because social relationship data contain sensitive information about users. …”
Get full text
Article -
492
Comparison of algorithms for multi-objective optimization of radio technical device characteristics
Published 2022-12-01“…The GDE3 algorithm may be recommended as a basic method for solving the considered problems. …”
Get full text
Article -
493
Stability Conditions for the Leaky LMS Algorithm Based on Control Theory Analysis
Published 2016-09-01“…One of the main aspects studied in the literature is the influence of the step size on stability or convergence of LMS-based algorithms. …”
Get full text
Article -
494
Consistent Algorithms Marching Along Characteristics for the Numerical Solution of the Boltzmann Equation
Published 2011-01-01“…In this work, we present the main functional spaces involved in the formalism and a description of the algorithms for the mesh generation and the transport equation solution. …”
Get full text
Article -
495
Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing
Published 2025-08-01Get full text
Article -
496
DETERMINING THE SIZE OF THE POPULATION OF THE GENETIC ALGORITHM FOR THE PROBLEMS OF DISCRETE OPTIMIZATION IN CAD
Published 2018-10-01“…The problem is solved for a genetic algorithm, where the genotype is represented by a chromosome in binary code, and the phenotype by a decimal integer code of values of independent variables. …”
Get full text
Article -
497
Routing algorithm for railway monitoring linear WSN based on improved PSO
Published 2022-05-01“…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
Get full text
Article -
498
EFFECTIVE ALGORITHM FOR STRUCTURAL OPTIMIZATION SUBJECTED TO FATIGUE DAMAGE AND RANDOM EXCITATION
Published 2018-06-01“…The entire computational process was implemented in MATLAB with the “Discret_Opt_Fat” main control program. The article presents the theoretical basis for the presented complex problem solution, its algorithmization and the technical application.…”
Get full text
Article -
499
Heart Rate Measurement Algorithm in the Monitoring System of Human Body Condition
Published 2023-12-01Get full text
Article -
500
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article