Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre...
详细信息
Surgical tool tip localization and tracking are essential components of surgical and interventional procedures. The cross sections of tool tips can be considered as acoustic point sources to achieve these tasks with d...
详细信息
Metaheuristics are commonly used in various fields,including real-life problem-solving and engineering appli*** present work introduces a novel metaheuristic algorithm named the Artificial Circulatory System Algorith...
详细信息
Metaheuristics are commonly used in various fields,including real-life problem-solving and engineering appli*** present work introduces a novel metaheuristic algorithm named the Artificial Circulatory System Algorithm(ACSA).The control of the circulatory system inspires it and mimics the behavior of hormonal and neural regulators involved in this *** work initially evaluates the effectiveness of the suggested approach on 16 two-dimensional test functions,identified as classical benchmark *** method was subsequently examined by application to 12 CEC 2022 benchmark problems of different ***,the paper evaluates ACSA in comparison to 64 metaheuristic methods that are derived from different approaches,including evolutionary,human,physics,and ***,a sequence of statistical tests was undertaken to examine the superiority of the suggested algorithm in comparison to the 7 most widely used algorithms in the existing *** results show that the ACSA strategy can quickly reach the global optimum,avoid getting trapped in local optima,and effectively maintain a balance between exploration and *** outperformed 42 algorithms statistically,according to post-hoc *** also outperformed 9 algorithms *** study concludes that ACSA offers competitive solutions in comparison to popüler methods.
Droplet microfluidics enable high-throughput screening,sequencing,and formulation of biological and chemical systems at the *** devices are generally fabricated in a soft polymer such as polydimethylsiloxane(PDMS).How...
详细信息
Droplet microfluidics enable high-throughput screening,sequencing,and formulation of biological and chemical systems at the *** devices are generally fabricated in a soft polymer such as polydimethylsiloxane(PDMS).However,developing design masks for PDMS devices can be a slow and expensive process,requiring an internal cleanroom facility or using an external ***,we present the first complete droplet-based component library using low-cost rapid prototyping and electrode *** fabrication method for droplet microfluidic devices costs less than$12 per device and a full design-build-test cycle can be completed within a *** microfluidic components for droplet generation,re-injection,picoinjection,anchoring,fluorescence sensing,and sorting were built and *** devices are biocompatible,low-cost,and *** show its ability to perform multistep workflows,these components were used to assemble droplet"pixel"arrays,where droplets were generated,sensed,sorted,and anchored onto a grid to produce images.
Epileptic seizure detection has been a complex task due to the chaos and non-stationariness observed in the electroencephalogram (EEG) signals. Most existing EEG-based seizure detection algorithms are patient-dependen...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new *** proposed chaos system achieves three positive Lyapunov *** results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.
Blockchain technology (BT) allows market participants to keep track of digital transactions without central recordkeeping. The features of blockchain, including decentralization, persistency, and attack resistance, al...
详细信息
暂无评论