19 results match your criteria: "International Information Technology University[Affiliation]"

In the paper, a mathematical model was constructed that describes the specifications of the wind flow and the dispersion of pollutants, taking into account the variable temperature on the roadway surface, which varies depending on the time for some quarter of the city of Almaty. The impact of the traffic tidal flow was studied based on the data of measuring passing vehicles as a source of pollution by the CFD and on the spatial distribution of pollutants for various types of pollution. A test problem was performed to validate the numerical algorithm and the mathematical model.

View Article and Find Full Text PDF

Bobcat Optimization Algorithm: an effective bio-inspired metaheuristic algorithm for solving supply chain optimization problems.

Sci Rep

August 2024

Research Laboratory in Economics, Management, and Business Management (LAREGMA), Faculty of Economics and Management, Hassan I University, 26002, Settat, Morocco.

Supply chain efficiency is a major challenge in today's business environment, where efficient resource allocation and coordination of activities are essential for competitive advantage. Traditional efficiency strategies often struggle for resources for the complex and dynamic network. In response, bio-inspired metaheuristic algorithms have emerged as powerful tools to solve these optimization problems.

View Article and Find Full Text PDF

Recognizing hand-object interactions presents a significant challenge in computer vision. It arises due to the varying nature of hand-object interactions. Moreover, estimating the 3D position of a hand from a single frame can be problematic, especially when the hand obstructs the view of the object from the observer's perspective.

View Article and Find Full Text PDF

Low-speed internet can negatively impact incident response by causing delayed detection, ineffective response, poor collaboration, inaccurate analysis, and increased risk. Slow internet speeds can delay the receipt and analysis of data, making it difficult for security teams to access the relevant information and take action, leading to a fragmented and inadequate response. All of these factors can increase the risk of data breaches and other security incidents and their impact on IoT-enabled communication.

View Article and Find Full Text PDF

In this paper, a new bio-inspired metaheuristic algorithm called the Lyrebird Optimization Algorithm (LOA) that imitates the natural behavior of lyrebirds in the wild is introduced. The fundamental inspiration of LOA is the strategy of lyrebirds when faced with danger. In this situation, lyrebirds scan their surroundings carefully, then either run away or hide somewhere, immobile.

View Article and Find Full Text PDF

In this paper, a new bio-inspired metaheuristic algorithm named the Kookaburra Optimization Algorithm (KOA) is introduced, which imitates the natural behavior of kookaburras in nature. The fundamental inspiration of KOA is the strategy of kookaburras when hunting and killing prey. The KOA theory is stated, and its mathematical modeling is presented in the following two phases: (i) exploration based on the simulation of prey hunting and (ii) exploitation based on the simulation of kookaburras' behavior in ensuring that their prey is killed.

View Article and Find Full Text PDF

Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things.

Sensors (Basel)

July 2023

Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia.

Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN), a four-layered paradigm for detecting malicious vehicles.

View Article and Find Full Text PDF

Authorities and policymakers in Korea have recently prioritized improving fire prevention and emergency response. Governments seek to enhance community safety for residents by constructing automated fire detection and identification systems. This study examined the efficacy of YOLOv6, a system for object identification running on an NVIDIA GPU platform, to identify fire-related items.

View Article and Find Full Text PDF

Multivalued logics are becoming one of the most important tools of information technology. They are in great demand for creation of artificial intelligence systems that are close to human intelligence, since the functioning of the latter cannot be reduced to the operations of binary logic. At the same time, the problem of improving the efficiency of using the results of research in multivalued logics, as well as the problem of interpreting variables of multivalued logic, is acute.

View Article and Find Full Text PDF

The work focuses on the behavior of heated effluents discharged at elevated temperatures into the Ilek River, which is located in the city of Aktobe, Kazakhstan, as a result of industrial activities. This study is aimed at studying the dispersion characteristics of heated effluents in the near and far fields at different flow rates and dynamic conditions of the river. The chemical reaction, which is formed as a result of the combination of the ejected substance and the substance in water, is numerically investigated.

View Article and Find Full Text PDF

This paper presents the numerical results of particle propagation in open space, taking into account the temperature of the human body and the surface of the ground. And also, the settling of particles or droplets under the action of gravitational force and transport in the open air is taken into account, taking into account the temperature during the process of breathing and sneezing or coughing. The temperature of the body and the surface of the ground, different rates of particle emission from the mouth, such as breathing and coughing or sneezing, are numerically investigated.

View Article and Find Full Text PDF

In this work, we numerically investigate the process of atmospheric air pollution in idealized urban canyons along the road in the presence of a viaduct, taking into account different height of barriers. To solve this problem, the 3D Reynolds-averaged Navier-Stokes equations (RANS) were used. The closure of this system of equations was achieved by using various turbulent models.

View Article and Find Full Text PDF

The worldwide COVID-19 pandemic has changed the development plans of every country. Instead, governments had to constantly deal with ever-emerging issues in healthcare, education, economics and industry. As a result, there has been an accelerated introduction of digitalization in these spheres.

View Article and Find Full Text PDF

QoS Analysis for Cloud-Based IoT Data Using Multicriteria-Based Optimization Approach.

Comput Intell Neurosci

September 2022

Department of Chemical Engineering, College of Biological and Chemical Engineering, Addis Ababa Science and Technology University, Addis Ababa, Ethiopia.

This work explains why and how QoS modeling has been used within a multicriteria optimization approach. The parameters and metrics defined are intended to provide a broader and, at the same time, more precise analysis of the issues highlighted in the work dedicated to placement algorithms in the cloud. In order to find the optimal solution to a placement problem which is impractical in polynomial time, as in more particular cases, meta-heuristics more or less approaching the optimal solution are used in order to obtain a satisfactory solution.

View Article and Find Full Text PDF

The new coronavirus disease COVID-19 has caused a worldwide pandemic to be declared in a very short period of time. The complexity of the infection lies in asymptomatic carriers that can inadvertently transmit the virus through airborne droplets. This kind of viral disease can infect the human body with tiny particles that carry various bacteria that are generated by the respiratory system of infected patients.

View Article and Find Full Text PDF

In this paper, numerical modeling of concentration propagation using various types of barriers and trees with porosity properties in an idealized urban canyon to protect nearby houses was considered. To solve this problem, a modification of the Reynolds-averaged Navier-Stokes equations is used to take into account the porous medium. To validate the mathematical model and the numerical algorithm, a test problem was solved without taking into account various barriers with a source of pollution.

View Article and Find Full Text PDF

This work presents sharing studies between 5G networks and point-to-point fixed service in the 6425-7125 MHz band. In this research, we provide simulations of interference from 5G downlink and uplink to fixed service in the frequency band 6425-7125 MHz. We evaluated several scenarios of interference, which include cross-border scenarios, as well as scenarios of interference within the borders of one administration.

View Article and Find Full Text PDF

Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have successfully been used in remote sensing classification, but the accuracy is greatly impacted and rather constrained by the statistical distribution of the sensing data.

View Article and Find Full Text PDF

This paper presents dataset collected from social networks that are mostly used by youth of Commonwealth of Independent States (CIS) countries. The data was collected from public accounts of VKontakte social network by using VK.api and applying the most used keywords that would signify depressive mood.

View Article and Find Full Text PDF