-
561
A Novel Approach for Sustainable Supply Chain Management with Analyzing the Effective Governance under Fuzzy Uncertainty
Published 2022-01-01“…In this regard, a mixed-integer mathematical model is proposed. In this mathematical model, an attempt is made to minimize the costs of the product distribution system by considering the effects of production, maintenance, and distribution. …”
Get full text
Article -
562
Improved grey wolf optimization algorithm based service function chain mapping algorithm
Published 2022-11-01“…With the rise of new Internet applications such as the industrial Internet, the Internet of vehicles, and the metaverse, the network’s requirements for low latency, reliability, security, and certainty are facing severe challenges.In the process of virtual network deployment, when using network function virtualization technology, there were problems such as low service function chain mapping efficiency and high deployment resource overhead.The node activation cost and instantiation cost was jointly considered, an integer linear programming model with the optimization goal of minimizing the average deployment network cost was established, and an improved grey wolf optimization service function chain mapping (IMGWO-SFCM) algorithm was proposed.Three strategies: mapping scheme search based on acyclic KSP algorithm, mapping scheme coding and improvement based on reverse learning and nonlinear convergence were added to the standard grey wolf optimization algorithm to form this algorithm.The global search and local search capabilities were well balanced and the service function chain mapping scheme was quickly determined by IMGWO-SFCM.Compared with the comparison algorithm, IMGWO-SFCM reduces the average deployment network cost by 11.86% while ensuring a higher service function chain request acceptance rate.…”
Get full text
Article -
563
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
Get full text
Article -
564
Emergency Evacuation of Hazardous Chemical Accidents Based on Diffusion Simulation
Published 2017-01-01“…Based on the characteristics of emergency evacuation of hazardous chemical accidents, we build a mixed-integer programming model and design a heuristic algorithm using network optimization and diffusion simulation (hereafter NODS). …”
Get full text
Article -
565
Modern Technology's role in accounting cost calculation of industrial enterprises: Informatization as a key strategy to improve management efficiency
Published 2025-01-01“…Firstly, the model employs mixed integer linear programming (MILP) to optimize production processes through mathematical modeling. …”
Get full text
Article -
566
Speed-up Technique in Time-Varying Shortest Path Problems with Arbitrary Waiting Times
Published 2020-09-01“…The problem is to find the shortest paths from a specific vertex (which is called a source) to other vertices, so that the total cost of the path is minimized and the total travel times and waiting times reach a maximum value of T, where T is a given positive integer. Then the speed-up technique is explained for a shortest path problem.…”
Get full text
Article -
567
Multiple Linear Regression Model Based on Neural Network and Its Application in the MBR Simulation
Published 2012-01-01“…The system is researched and developed with the hybrid programming of VC++ programming language and OpenGL, with a multifactor linear regression model of affecting MBR membrane fluxes based on neural network, applying modeling method of integer instead of float and quad tree recursion. …”
Get full text
Article -
568
Cross-domain task offloading and computing resource allocation for edge computation in industrial Internet of things
Published 2020-06-01“…In the industrial Internet of things,limited by the computing capacity of field devices,the task offloading based on edge computing can effectively alleviate the computing burden of field devices and provide low-latency computing services.Moreover,because the load of edge servers are different in different areas of the network,it is necessary to reasonably arrange task offloading and allocate computing resources of edge servers,thereby reducing task completion delay and achieving load balance.Thus,the task offloading and resource allocation for edge computing in the industrial Internet of things was studied,a cross-domain offloading model for computing tasks in the industrial Internet of things was proposed,and a mixed integer nonlinear optimization problem that minimizes task completion time was formulated.The problem was decomposed it into two sub-problems of resource allocation and task offloading,based on the characteristics of the two sub-problems,the optimal solution of resource allocation and task offloading strategy were obtained through iterative and alternating solution.The experimental results show that compared with the non-cross-domain strategy,the load imbalance of the edge server and the task completion delay are reduced effectively by the proposed strategy.…”
Get full text
Article -
569
Analysis and Control of Fractional Order Generalized Lorenz Chaotic System by Using Finite Time Synchronization
Published 2019-01-01“…In this paper, we present a corresponding fractional order three-dimensional autonomous chaotic system based on a new class of integer order chaotic systems. We found that the fractional order chaotic system belongs to the generalized Lorenz system family by analyzing its linear term and topological structure. …”
Get full text
Article -
570
A Bayesian regularization intelligent computing scheme for the fractional dengue virus model
Published 2025-03-01“…The FO derivatives present more precise results as compared to integer order for solving the DVM. The dynamics of the mathematical DVM form is considered into five classes. …”
Get full text
Article -
571
On the Existence, Uniqueness, and Basis Properties of Radial Eigenfunctions of a Semilinear Second-Order Elliptic Equation in a Ball
Published 2009-01-01“…First, we prove that for each integer 𝑛≥0 there exists a radially symmetric eigenfunction 𝑢𝑛 which possesses precisely 𝑛 zeros being regarded as a function of 𝑟=|𝑥|∈[0,1). …”
Get full text
Article -
572
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Published 2023-01-01“…The initial value y0 determines the encryption method of the nonlinear function. Taking the integer variable (int) as an example, the value range is -231~231. …”
Get full text
Article -
573
Comparative Study of Generalized Sum Graphs via Degree-Based Topological Indices
Published 2022-01-01“…In this paper, we have computed first Zagreb, second Zagreb, forgotten, and hyper Zagreb indices of the generalized Q-sum graph H1QαH2 in the form of different TIs of its basic graphs, where α≥1 is a positive integer. This family of graphs is obtained by the lexicographic product of the graph QαH1 and H2, where QαH1 is constructed with the help of the generalized line superposition operation Qα on H1. …”
Get full text
Article -
574
Stego on FPGA: An IWT Approach
Published 2014-01-01“…A reconfigurable hardware architecture for the implementation of integer wavelet transform (IWT) based adaptive random image steganography algorithm is proposed. …”
Get full text
Article -
575
Generalized third-kind Chebyshev tau approach for treating the time fractional cable problem
Published 2024-11-01“…We utilize the tau method for the numerical treatment of the TFCE, using generalized Chebyshev polynomials of the third kind (GCPs3) as basis functions. The integer and fractional derivatives of the GCPs3 are the essential formulas that serve to transform the TFCE with its underlying conditions into a matrix system. …”
Get full text
Article -
576
On some solitary wave solutions of the Estevez--Mansfield--Clarkson equation with conformable fractional derivatives in time
Published 2024-12-01“…In this study, a generalization of the Estevez–Mansfield–Clarkson (EMC) equation that considers the presence of conformable time-fractional derivatives is investigated analytically. The integer-order model finds applications in mathematical physics, optics, and the investigation of shape developing in liquid drops. …”
Get full text
Article -
577
Safety Characteristic Evaluation of Cage in Cylindrical Roller Bearing at the Stage of Start-Up and Stop
Published 2020-01-01“…The dynamics model of cylindrical roller bearing (CRB) in aeroengine main shaft was promoted and solved by Hilber–Hughes–Taylor (HHT) integer algorithm with variable step in combination with symmetric multiprocessing (SMP) parallel solving technology, and a finite element model of roller to cage contact was built. …”
Get full text
Article -
578
Description of steady-state creep rate with continuously varying stress sensitivity parameter and upper limits of applied stress
Published 2025-01-01“…As the exponent of the power law, called the stress sensitivity parameter and dependent on the deformation micromechanism, a specific integer is taken. A deeper study of empirical results shows that the apparent activation energy depends significantly on the applied stress and the deformation mechanism can change if the temperature varies over a wide range. …”
Get full text
Article -
579
Robust Optimization for Electric Vehicle Routing Problem Considering Time Windows Under Energy Consumption Uncertainty
Published 2025-01-01“…This research proposes an electric vehicle routing problem considering time windows under energy consumption uncertainty. A mixed-integer programming model is established. The robust optimization method is adopted to deal with the uncertainty. …”
Get full text
Article -
580
SPATIAL DEVELOPMENT OF TERRITORIES: STATUS, TRENDS, INTEGRATED APPROACH TO ASSESSING THE DIFFERENTIATION OF REGIONS (TERRITORIES)
Published 2020-06-01“…Aspect novelty of the estimation methodology consists in a unified comparative analysis of empirical integrated indicators obtained by calculating partial values of criterion-factors by means of converging integer series using methods of limit equations in combination with the method of Lyapunov's functions in comparison with threshold values of the corresponding integrated indicators. …”
Get full text
Article