Multiobjective Evolutionary Algorithms based on Decomposition (MOEA/D) represent a widely used class of population-based metaheuristics for the solution of multicriteria optimization problems. We introduce the MOEADr ...
详细信息
This paper investigates the problem of sustainable city transport. The significance of this problem is increasing, considering the inevitable increase of air pollution levels in cities. Currently, cars with diesel eng...
详细信息
This paper investigates the problem of sustainable city transport. The significance of this problem is increasing, considering the inevitable increase of air pollution levels in cities. Currently, cars with diesel engines are not admitted to many city centers, and this trend can be expected to be maintained. Moreover, this restriction will be expanded to all combustion cars in the foreseeable future. Therefore, combustion vehicles will eventually be replaced by electric ones. In this paper, the authors use the Characteristic Objects METhod (COMET) to identify a decision-making model for the selection of the best model of car for sustainable city transport. The COMET method is a new approach that is free of the rank reversal phenomenon. The identified model provides information about the significance level of each of the criteria. The presented approach can easily be expanded by using a greater number of criteria and alternatives, depending on the specification of the considered problem. Moreover, the interval numbers concept is proposed as the basic approach to dealing with input data uncertainty by using the COMET method. The presented technique is an efficient and highly accurate approach to make decisions based on experts’ experience.
This is the pre-acceptance version, to read the finalversion please go to IEEE Transactions on Geoscience andRemote Sensing on IEEE Xplore. With the rapid development of spaceborne imaging techniques, object detection...
详细信息
In hyperspectral image (HSI) classification, spatial context has demonstrated its significance in achieving promising performance. However, conventional spatial context-based methods simply assume that spatially neigh...
详细信息
Introduction: Heart rate variability (HRV) analysis tools have been mainly available for analysis of human electrocardiographic derived heart rate. We explore extending HRV analysis to two additional dimensions: (1) a...
详细信息
ISBN:
(纸本)9781728109244
Introduction: Heart rate variability (HRV) analysis tools have been mainly available for analysis of human electrocardiographic derived heart rate. We explore extending HRV analysis to two additional dimensions: (1) analysis across multiple mammalian species and (2) analysis across different levels of integration for example sinoatrial tissue. Methods: We analyzed the beating rate variability (BRV) across the two additional dimensions using the PhysioZoo computer program that we recently introduced. We used published databases of electrocardiograms from four mammal types: human (n=18), dog (n=17), rabbit (n=4) and mouse (n=8). We computed the BRV measures for each. We also show how the PhysioZoo program can be used for the analysis of sinoatrial node tissue BRV. Results: The study of typical mammalian heart and respiration rates (obtained from the dominant high frequency peak) revealed a linear relationship between these two quantities. Analysis of the rabbit sinoatrial node tissue BRV showed that it had reduced overall variability when compared to in vivo heart BRV.
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients...
详细信息
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node to join it, eliminating the risk of some types of threats that could be caused by infected nodes.
Cloud computing has been developed as one of the prominent paradigm for providing on demand resources to the end user based on signed service level agreement and pay as use model. Cloud computing provides resources us...
详细信息
We propose a projection based multi-moment matching method for model order reduction of quadratic-bilinear systems. The goal is to construct a reduced system that ensures higher-order moment matching for the multivari...
详细信息
Due to SARS-CoV-2 (Severe Acute Respiratory Syndrome Coronavirus 2) being a novel virus, there are currently no known effective antiviral drugs capable of slowing its progress. To accelerate the discovery of potential...
详细信息
暂无评论