This work investigates a multi-product parallel disassembly line balancing problem considering multi-skilled workers.A mathematical model for the parallel disassembly line is established to achieve maximized disassemb...
详细信息
This work investigates a multi-product parallel disassembly line balancing problem considering multi-skilled workers.A mathematical model for the parallel disassembly line is established to achieve maximized disassembly profit and minimized workstation cycle *** on a product’s AND/OR graph,matrices for task-skill,worker-skill,precedence relationships,and disassembly correlations are developed.A multi-objective discrete chemical reaction optimization algorithm is *** enhance solution diversity,improvements are made to four reactions:decomposition,synthesis,intermolecular ineffective collision,and wall invalid collision reaction,completing the evolution of molecular *** established model and improved algorithm are applied to ball pen,flashlight,washing machine,and radio combinations,*** a Collaborative Resource Allocation(CRA)strategy based on a Decomposition-Based Multi-Objective Evolutionary Algorithm,the experimental results are compared with four classical algorithms:MOEA/D,MOEAD-CRA,Non-dominated Sorting Genetic Algorithm Ⅱ(NSGA-Ⅱ),and Non-dominated Sorting Genetic Algorithm Ⅲ(NSGA-Ⅲ).This validates the feasibility and superiority of the proposed algorithm in parallel disassembly production lines.
In the era of data-driven decision-making, the ability to rapidly and accurately analyze vast amounts of textual data is essential. This paper examines the role of text pre-processing techniques in enhancing the effec...
详细信息
Internet of things is the most emergent technology, expanding interconnected device networks day by day to enhance the ease of device control and monitoring. IoTs are not covering the commercial utility but also provi...
详细信息
In healthcare, accessing diverse and large datasets for machine learning poses challenges due to data privacy concerns. Federated learning (FL) addresses this by training models on decentralized data while preserving ...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object segmentation:one is that the single frame calculation time is too long,and the other is that the current frame’s segmentation should use more information from past *** algorithm uses a global context(GC)module to achieve highperformance,real-time *** GC module can effectively integrate multi-frame image information without increased memory and can process each frame in real ***,the prediction mask of the previous frame is helpful for the segmentation of the current frame,so we input it into a spatial constraint module(SCM),which constrains the areas of segments in the current *** SCM effectively alleviates mismatching of similar targets yet consumes few additional *** added a refinement module to the decoder to improve boundary *** model achieves state-of-the-art results on various datasets,scoring 80.1%on YouTube-VOS 2018 and a J&F score of 78.0%on DAVIS 2017,while taking 0.05 s per frame on the DAVIS 2016 validation dataset.
Imperfections in requirement specification can cause serious issues during software development life cycle. It might bring about inferior quality products due to missing attributes, for example, security. Specifically...
详细信息
The generation and replication of network traffic are essential tasks for testing, analyzing, simulating, and evaluating the behavior and efficiency of systems, protocols, applications, and network services. However, ...
详细信息
Since Industry 5.0 emphasizes that manufacturing enterprises should raise awareness of social contribution to achieve sustainable development, more and more meta-heuristic algorithms are investigated to save energy in...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
暂无评论