Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Shuai Yang 1, Wei Zhang 1
1State Grid Shanxi Electric Power Company Marketing Service Center, Taiyuan, Shanxi, 030000, China
Abstract:

Power metering system is directly related to the production and operation level and benefit of power supply enterprises, and even has a close relationship with the national economic development and people’s life. Numerous scholars have applied deep learning to the field of fault diagnosis. Accordingly, this paper proposes a fault diagnosis method for power metering system based on stacked autoencoder (SAE) algorithm. The deep learning data samples are formed by comprehensively collecting the historical operation data of the system and the feature data provided by the third-party manufacturers. And the fault diagnosis model is designed with the SAE algorithm, and the training and optimization fine-tuning of the algorithm model is realized by BP neural network. Finally, the model is trained using explicit test data samples, and the BP neural network can reach the set accuracy after 3804 training sessions with the output error. Compared to Elman neural network iterations are less and converge faster. Using the trained fault detection model of power metering system for fault diagnosis, the model can successfully classify the faults and achieve the expected diagnostic effect.

Wei Zhang 1, Qiong Cao 1, Shuai Yang 1, Yinlong Zhu 1
1State Grid Shanxi Electric Power Company Marketing Service Center, Taiyuan, Shanxi, 030000, China
Abstract:

This paper presents an AdaBoost-DNN (Adaptive Boosting-Deep Neural Network) model for the detection of anomalous electricity consumption in power grid users. Initially, the k-means SMOTE (Synthetic Minority Oversampling Technique) technique is employed to enhance the sample set of the original anomalous consumption data to address the issue of data imbalance. Subsequently, an ensemble learning model based on AdaBoost-DNN is designed for the detection of anomalous consumption. To validate the effectiveness and superiority of the proposed AdaBoost-DNN model, comparative experiments are conducted with three traditional algorithms.

Liangyun Zhu 1, Gaofeng Mi 1, Dan Chen 1
1School of Design and Art, Shaanxi University of Science and Technology, Xi’an, Shaanxi, 710119, China
Abstract:

This study aims to construct a corporate demand model of brand design for financial central enterprises based on grounded theory, providing a systematic theoretical framework to help financial central enterprises effectively meet their brand design needs. The method of grounded theory is used to extract relevant information from public information and in-depth interviews, and to demonstrate the rationality of the corporate demand model by combining quantitative research. Through an in-depth analysis of the subsystems of demand motivation generation, demand factor analysis and demand design realisation, a feasible theoretical framework is provided for financial central enterprises to achieve effective satisfaction of brand design corporate demands. The problem of accurately grasping requirements in the practice of brand design for financial central enterprises is solved. Useful reference and support are provided for the brand design of financial central enterprises. The innovative practice of brand design is promoted for financial central enterprises.

Jie Zhang 1,2
1Department of Management Information, Anhui College of Mining and Technology, Huaibei, Anhui, 235000, China
2Department of Management Information, Huaibei Coal Technicians College of Anhui, Huaibei, Anhui, 235000, China
Abstract:

This study investigates the application of artificial intelligence techniques in coal mine gas monitoring and prediction, aiming to construct more efficient and accurate gas concentration prediction models to reduce the risk of gas explosion in coal mine production. Due to the limited performance of traditional prediction methods in dealing with high-dimensional and dynamic three-dimensional mining environments, this study employs a fusion model based on temporal convolutional network (TCN) and temporal generative adversarial network (TimeGAN), TCN-TimeGAN, to predict the gas concentration. The model combines the interval sampling advantage of TCN and the time series characteristics of TimeGAN, and through four processes of embedding, recovering, by generating and discriminating gas concentration time sequences, the time-dependent features of gas concentration data can be effectively captured, thus improving the prediction accuracy and timeliness. In this study, gas concentration data from September 2020 through December 2021 were used as the basis, through data cleaning and outlier processing, it is found that the gas concentration data has obvious time-dependence, which is suitable for using time series modeling. Embedding and Recovery Networks via TCN-TimeGAN Modeling, the gas concentration data are mapped to a low-dimensional feature space, a generative network is then used to generate new time series data from random noise, and the model parameters are optimized by combining the discriminative network in order to improve the quality and consistency of the generated data. In particular, to cope with the problem of gradient instability of generative adversarial networks during training, In this paper, Wasserstein distance is introduced to optimize the loss function and a gradient penalty term is added during the training process to improve the stability of model training and the realism in the samples generated. In addition, this study also explores the prediction performance of combining LSTM networks for gas concentration. The standard recurrent neural network (RNN) faces the problem of gradient vanishing in the processing of long time-dependent data, whereas the improved LSTM overcomes this problem through memory cells and gating mechanism for real-time prediction task of gas concentration. In this study, the LSTM is further extended to three-dimensional spatial input data, experiments demonstrate the prediction accuracy of the improved LSTM. To verify the validity of the model, this paper adopts a hierarchical K-fold cross-validation method, which divides the data into a training set and a validation set to ensure that the model can be generalized. Experimental results indicate that TCN-TimeGAN and improved LSTM significantly outperform traditional methods in gas concentration prediction. By analyzing the training and validation accuracies, the models showed high prediction accuracy (89.1% to 93.8%) after 20 epochs, verifying the stability and applicability of the models.
In conclusion, this study shows that the gas prediction model based on TCN-TimeGAN and improved LSTM can more accurately predict the gas concentration in coal mines, improve the intelligence level of coal mine gas monitoring, and provide technical support for safe production in coal mines. Meanwhile, the methods and models in this study also provide new thoughts and methods for time series data prediction in other fields.

Hao Zhang 1
1Nanjing Forestry University, Nanjing, Jiangsu, 210037, China
Abstract:

This paper presents an innovative optimization framework aimed at data mining in social networks, guaranteeing solutions for some of the basic challenges of computational efficiency, scalability, and accuracy. This work presents a precise approach that integrates state-of-the-art algorithmic enhancements with dynamic resource management techniques. Extensive experimental validation using real and synthetic datasets has marked the significant performance gains achieved within the framework. These results point to a 70.2% reduction in processing time and a 71.2% saving in memory consumption, all while maintaining accuracy rates above 95%. This optimization framework is very stable under different operation conditions, since its responses have always remained below 85 ms under peak loads of up to 245,000 requests per second. The empirical evaluation of the framework across diverse social networking platforms bears testimony to the fact of practical efficacy and has emerged strongly while dealing with dynamic network architecture with extensive data processing needs. The application results in significant improvement in resource utilization efficiency, providing sub-linear increase in memory consumption for maintaining consistent performance under fluctuating load scenarios. The present study extends the scope of social network analysis by proposing a scalable, efficient, and reliable optimization framework that might be of vital importance in both research and practical implementation contexts.

Kuanwei Huang 1
1Business School, Lingnan Normal University, Zhanjiang, Guangdong, 524048, China
Abstract:

With the unprecedented growth of technological advancement, effective technological transfer has become increasingly important in all dimensions of human lives. Technological transfer is a multi-level and complex ecosystem network with complicated inter-relational elements and effective fac-tors. This complexity raises the question of how to rearrange the elements of the technology transfer to improve its positive performance. To address this issue, this study aims to compare the perfor-mance and gaps of the three modes of technology transfer, which are technology entrepreneurship, technology licensing, and technology shareholding, by evaluating the three participants, which are universities/research institutes, corporations, and intermediary agencies, using related attributes. This study applies a hybrid multiple attribute decision-making (HMADM) model including the DE-MATEL for constructing the INRM, DANP for computing influence weights, modified VIKOR for evalu-ating the performances and gaps among the three technology transfer modes so that to develop sus-tainable and systemic improvement strategies. At the macro level, the results show that, the technol-ogy transfers modes receive an overall positive effect, especially universities/research institutions. At the micro level, the technology licensing has not only the highest performance but also the largest gap. According to this finding, technology licensing is the most feasible way to cater to technology transfer at the macro level from the micro level. The findings suggest decision makers pay attention to the role of universities/research institutes as the main factor influencing technology transfer ef-fectiveness. Also, they should focus on influential attributes such as researcher participation and technical collaboration ability for reducing the gap.

Xia Chen 1, Huagen Yin 2, Yanxiang Zhou 3, Lin Zhou 4
1School of Physical Education, Putian University, Putian, Fujian, 351100, China
2 College of Physical Education, Shangrao Normal University, Shangrao, Jiangxi, 334001, China
3 Shangrao Health Vocational College, Shangrao, Jiangxi, 334600, China
4East University of Heilongjiang, Harbin, Heilongjiang, 610043, China
Abstract:

With the reforms in competition rules and equipment by the International Table Tennis Federation (ITTF), the number of rounds in table tennis matches has increased, placing higher demands on athletes’ abilities to transition between technical and tactical offensive and defensive strategies, as well as on their physical and psychological qualities. Therefore, this study employs methods such as the strength difference evaluation, competition performance (CP), and multiple regression. Using 48 international important matches in which Player W (anonymous) participated as case studies, the study evaluates and predicts the competitive performance of W when facing athletes of different world rankings. The results indicate that in matches against athletes with different skill rankings, the phases where the technical strength difference significantly affects competition performance (CP) are the attack-after-serve phase and attack-after-receive phase, followed by the rally phase, and finally, the rally phase Ⅱ. The competitive level in serve rounds is superior to that in receive rounds. The Kruskal-Wallis test results reveal significant fluctuations in the competition performance (CP) during the rally phase Ⅱ, demonstrating highly significant differences (P < 0.01). In matches, Player W has a very low probability of winning when not holding an absolute advantage in key techniques (the first four strokes) – particularly pronounced when facing athletes ranked in the world top 20. The multiple regression model for the technical strength difference in table tennis matches plays a certain role in predicting the performance of athletes in terms of technical and tactical indicators during matches, offering a clear reflection of the effectiveness of these indicators.

Lu He 1, Wei Wei 1
1School of Computer and Electronic Information, Guangxi University, Nanning, Guangxi, 530000, China
Abstract:

The presented article develops the detailed analysis of battery performance degradation profiles for EVs, based on operational data collected in real-world use. Based on data points gathered for 150 vehicles over 24 months, we have developed and then validated an integrated degradation prediction model incorporating several degradation mechanisms. Our study applies a novel hybrid approach that will combine physics-based principles with data-driven methods for outlining the battery aging profile. The model proposed in this paper realizes a better prediction performance of 94.3% under different operational conditions and thus proves to be considerably superior to the existing techniques. Indeed, the change of temperature and charging behavior becomes the main influence factor with the correlation coefficient of 0.85 and 0.78, respectively. After applying the proposed model to a fleet management system, there are 32.4% maintenance cost reduction and 15.8% increasing of the cycle life for batteries. It represents in detail the continuous degradation assessment and predictive maintenance framework, validated on different vehicle platforms under varying operational conditions. These findings provide valuable inputs related to the improvement of battery management strategies and life extension of a battery in electric vehicle applications, hence benefiting theoretical understanding and practical application in electric vehicle battery management.

Xia Wu 1
1Department of Information Engineering, Henan Vocational College of Water Conservancy and Environment, Zhengzhou, Henan, 450008, China
Abstract:

It has identified and presented a unified machine-learning-based malware defense system that can handle dynamic features in cyber-security challenges. This approach will leverage recent deep learning models, ensembles, and automatic generation of defense strategies to construct an effective and adaptive framework for malware detection and mitigation. These results tend to indicate significant gains compared with traditional signature-based approaches, whereby known malware detection rates reached 99.2%, and zero-day vulnerabilities reached 87.5%. The system also recorded an extra 68% reduction in false positives after one month of operations due to the adaptive learning component, while real-time detection features yielded less than a one-second response time for 95% of the threatened records. The generated defense strategy module can demonstrate a 92% success rate in the automated mitigation or containment of identified threats. The paper further presents that even with such advances, much potential still exists for optimizing resource use, enhancing model interpretability, and building more robust defenses against adversarial attacks. It enhances the area of cybersecurity and adds a new dimension by showing the capability of AI-enabled methodology to create much more efficient, agile, and flexible malware protection systems-thereby paving the way for more advanced cybersecurity innovations.

Huiwei Yang 1
1Department of Information and Artificial Intelligence, Wuhu Institute of Technology, Wuhu, Anhui, 241000, China
Abstract:

This paper presents a hardware encryption system based on FPGA (Field-Programmable Gate Array) implementing the elliptic curve cryptography algorithm. Using FPGA as the core control unit, IoT (Internet of Things) data transmission terminals are connected to FPGA-specific external interfaces via USB/SPI interfaces. Data collected into the FPGA undergoes encryption and decryption using the FPGA’s internal hardware resources. The encrypted data is then converted into TCP/IP protocol packets and transmitted to a cloud server through the FPGA’s internal Ethernet interface circuit module. A detailed analysis and design of the hardware implementation of the elliptic curve encryption algorithm are provided. Simulation validation of the point multiplication algorithm was conducted on a computer platform with a quad-core 3.2GHz processor and 8GB of memory, using the Xilinx 5vlx20tff323 chip. The simulation results indicate that the maximum execution frequency reached 372.686 MHz, with a single point multiplication operation completed in 3328 . This significantly enhances the processing speed of the algorithm, bearing significant theoretical value and practical implications for advancing the security of the IoT ecosystem.

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;