Current Research in Public Health
Volume 1, Issue 1, 2019
Open Access July 28, 2023 10 pages 445 views 146 downloads

Some Software Application of the Monte Carlo Method

Current Research in Public Health 2023, 1(1), 704. DOI: 10.31586/ujcsc.2023.704
Abstract
We study the using the Monte Carlo method and its application. Below are several examples of software implementations of the Monte Carlo method for performing calculations that will allow us to determine the necessary information in cases where probability can be applied. Below is a software implementation of the examples in the C# programming language. The programs have a desktop interface and
[...] Read more.
We study the using the Monte Carlo method and its application. Below are several examples of software implementations of the Monte Carlo method for performing calculations that will allow us to determine the necessary information in cases where probability can be applied. Below is a software implementation of the examples in the C# programming language. The programs have a desktop interface and allow us to calculate such values as the number π and the time required to perform certain actions.Full article
Article
Open Access December 23, 2022 6 pages 2630 views 239 downloads

A Problem of Accuracy of Computer Calculations

Current Research in Public Health 2022, 1(1), 531. DOI: 10.31586/ujcsc.2022.531
Abstract
The paper presented the results of the research related to the analysis of the reliability of computer calculations. Relevant examples of incorrect program operation were demonstrated: both quite simple and much less obvious, such as S. Rump's example. In addition to mathematical explanations, authors focused on purely software capabilities for controlling the accuracy of complex calculations. For
[...] Read more.
The paper presented the results of the research related to the analysis of the reliability of computer calculations. Relevant examples of incorrect program operation were demonstrated: both quite simple and much less obvious, such as S. Rump's example. In addition to mathematical explanations, authors focused on purely software capabilities for controlling the accuracy of complex calculations. For this purpose, examples of effective use of the functionality of the decimal and fraction modules in Python 3.x were given.Full article
Review Article
Open Access December 15, 2022 18 pages 1232 views 1822 downloads

Effective Parameters to Design an Automatic Parking System

Current Research in Public Health 2022, 1(1), 550. DOI: 10.31586/ujcsc.2022.550
Abstract
The automated parking system is an extensive branch of smart transport systems. The smartness of such systems is determined by different parameters such as parking maneuver planning. Coding this control system includes vehicle parking and understanding the environment. A high-quality classification mask has been used on each sample to analyze the automated vehicle parking parameters. Mask
[...] Read more.
The automated parking system is an extensive branch of smart transport systems. The smartness of such systems is determined by different parameters such as parking maneuver planning. Coding this control system includes vehicle parking and understanding the environment. A high-quality classification mask has been used on each sample to analyze the automated vehicle parking parameters. Mask region-based convolutional neural networks (R-CNN) was taught using a small computational workload titled faster R-CNN that operates in five frames per second. In this paper, the rapidly-exploring random tree (RRT) method was used for routing the parking space and a nonlinear model predictive control (NMPC) controller was added to develop this system. We add the line detection algorithm commands to the mask R-CNN algorithm. The results can be useful to design a secure automatic parking system as well as a powerful perception system.Full article
Article
Open Access June 16, 2022 8 pages 622 views 210 downloads

Clutter Suppression Algorithm of Ultrasonic Color Doppler Imaging Based on BP Neural Network

Current Research in Public Health 2022, 1(1), 315. DOI: 10.31586/ujcsc.2022.315
Abstract
Aiming at the time complexity of singular value spectrum weighted Hankel SVD filtering algorithm, a clutter suppression algorithm for ultrasonic color Doppler imaging based on BP neural network model is proposed in this paper. Firstly, using the PRF data collected by portable ultrasound instrument, we verify the singular value weighted Hankel SVD filtering algorithm, and the results show that the
[...] Read more.
Aiming at the time complexity of singular value spectrum weighted Hankel SVD filtering algorithm, a clutter suppression algorithm for ultrasonic color Doppler imaging based on BP neural network model is proposed in this paper. Firstly, using the PRF data collected by portable ultrasound instrument, we verify the singular value weighted Hankel SVD filtering algorithm, and the results show that the algorithm has high accuracy; Then, the BP neural network model is established based on the input and output data of singular value weighted Hankel-SVD filtering algorithm; Finally, the clutter suppression algorithm of ultrasonic color Doppler imaging based on BP neural network model is established. The experimental results show that compared with Hankel SVD filtering algorithm, the clutter suppression algorithm proposed in this paper greatly shortens the operation time without reducing the accuracy, so as to improve the real-time performance of the filtering algorithm.Full article
Article
Open Access April 22, 2022 8 pages 3082 views 104 downloads

Particle Swarm Network Design for UCAV Intelligence System Path Planning

Current Research in Public Health 2022, 1(1), 267. DOI: 10.31586/ujcsc.2022.267
Abstract
In military battle, the unmanned combat aerial vehicle (UCAV) plays a critical role. The UCAV avoids the fatal military zone as well as radars. If there is just a narrow path between the defensive areas, it is dan-gerous. It chooses the quickest and safest path. The balance evolution technique is used to improve the path planning of UCAV in this study, which results in a novel artificial bee
[...] Read more.
In military battle, the unmanned combat aerial vehicle (UCAV) plays a critical role. The UCAV avoids the fatal military zone as well as radars. If there is just a narrow path between the defensive areas, it is dan-gerous. It chooses the quickest and safest path. The balance evolution technique is used to improve the path planning of UCAV in this study, which results in a novel artificial bee colony. To regulate the position of a swarm of UCAVs, a particle swarm network is used to communicate between the UCAVs in the swarm. According to simulation data, the particle swarm network technique is more efficient than the ABC ap-proach. The intelligence system is taught via an artificial neural network.Full article
Article
Open Access January 10, 2022 15 pages 511 views 50 downloads

Composable Infrastructure: Towards Dynamic Resource Allocation in Multi-Cloud Environments

Current Research in Public Health 2022, 1(1), 1222. DOI: 10.31586/ujcsc.2022.1222
Abstract
To ensure maximum flexibility, service providers offer a variety of computing options with regard to CPU, memory capacity, and network bandwidth. At the same time, the efficient operation of current cloud applications requires an infrastructure that can adjust its configuration continuously across multiple dimensions, which are generally not statically predefined. Our research shows that these
[...] Read more.
To ensure maximum flexibility, service providers offer a variety of computing options with regard to CPU, memory capacity, and network bandwidth. At the same time, the efficient operation of current cloud applications requires an infrastructure that can adjust its configuration continuously across multiple dimensions, which are generally not statically predefined. Our research shows that these requirements are hardly met with today's typical public cloud and management approaches. To provide such a highly dynamic and flexible execution environment, we propose the application-driven autonomic management of data center resources as the core vision for the development of a future cloud infrastructure. As part of this vision and the required gradual progress toward it, we present the concept of composable infrastructure and its impact on resource allocation for multi-cloud environments. We introduce relevant techniques for optimizing resource allocation strategies and indicate future research opportunities [1]. Many cloud service providers offer computing instances that can be configured with arbitrary capacity, depending on the availability of certain hardware resources. This level of configurability provides customers with the desired flexibility for executing their applications. Because of the large number of such prerequisite instances with often varying characteristics, service consumers must invest considerable effort to set up or reconfigure elaborate resource provisioning systems. Most importantly, they must differentiate the loads to be distributed between jobs that need to be executed versus placeholder jobs, i.e., jobs that trigger the automatic elasticity functionality responsible for resource allocator reconfiguration. Operations research reveals that the optimization of resource allocator reconfiguration strategies is a fundamentally difficult problem due to its NP-hardness. Despite these challenges, dynamic resource allocation in multi-clouds is becoming increasingly important since modern Internet-based service settings are dispersed across multiple providers [2].Full article
Review Article
Open Access December 27, 2019 13 pages 315 views 41 downloads

A Comprehensive Study of Proactive Cybersecurity Models in Cloud-Driven Retail Technology Architectures

Current Research in Public Health 2021, 1(1), 1253. DOI: 10.31586/ujcsc.2019.1253
Abstract
This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail environment creates a need for more comprehensive and proactive security technologies that protect both the psychological estate and fiscal estate. This work contributes to cloud-driven retail research
[...] Read more.
This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail environment creates a need for more comprehensive and proactive security technologies that protect both the psychological estate and fiscal estate. This work contributes to cloud-driven retail research by investigating anticipatory security technologies across numerous case studies. These case studies offer best practice models for elevating proactive cybersecurity in retail environments. The academic and professional communities currently lack security information and practices that apply to the retail environment. It is anticipated that the final results of this project will have value in shaping the next set of research in cybersecurity in retail environments. Many retail organizations are restricted to reactive security operations. Advanced security technologies operate on piloted activations that require the intervention of security analysts. In actuality, basic security products and security operations are now piloted by automation and machine learning. In one case study, a retail CTO shares a forensics example using a proactive security technology aimed at both psychological estate and fiscal estate. In another case study, direct discussions provide a retail university lecturer with insight into the use of driven intelligence for inventory management. The use of card technology for a model is used as an example that can be implemented as security technology which can be offered as a service to retail organizations.Full article
Review Article
Open Access December 27, 2021 17 pages 38 views 34 downloads

Digital Transformation in Insurance: Migrating Enterprise Policy Systems to .NET Core

Current Research in Public Health 2021, 1(1), 1348. DOI: 10.31586/ujcsc.2021.1348
Abstract
Migrating enterprise policy systems to .NET Core is a key objective of digital transformation in the Insurance IT ecosystem. This change directly addresses strategic drivers: enabling adoption of cloud-first development, resisting market pressure for more flexible and usable enterprise solutions, and preparing for changing demands from regulation and compliance. Phases of operational benefit
[...] Read more.
Migrating enterprise policy systems to .NET Core is a key objective of digital transformation in the Insurance IT ecosystem. This change directly addresses strategic drivers: enabling adoption of cloud-first development, resisting market pressure for more flexible and usable enterprise solutions, and preparing for changing demands from regulation and compliance. Phases of operational benefit aligned with risk mitigation form the basis of the migration roadmap, with a strong focus on engaging all relevant stakeholders. Market pressure for a SEAMLESS user experience across ALL applications is a fundamental driver for Investment in digital transformation. Gaps remain in enterprise Operations, where Legislative and regulatory accountability Demand rigid and complex solutions that Liberty has not yet been able to provide. New risk-based capital requirements, Data-Sovereignty controls, Controls for sensitive Data in the Cloud, and new Audit requirements create a long list of challenges for the ecosystem that can no longer be Deferred. At the same time, Cross-organisational integration is becoming more important and integrating partners from the insurance supply-chain requires a much more flexible approach to development and Deployment. These factors combine to generate a credible case for accelerated digital investment with a focus on Migration to Cloud Platforms, with related Risk mitigation, Quality Improvements, and flexibility benefits that close Industry gaps.Full article
Review Article
ISSN: 2831-5162
DOI prefix: 10.31586/crph
Journal metrics
Publication year
2021-2026
Journal (home page) visits
46561
Published articles
29
Article views
39787
Article downloads
7494
Downloads/article
258
APC
99.00