Showing 681 - 700 results of 1,449 for search '(( different evolution algorithm ) OR ( differential evaluation algorithm ))', query time: 0.17s Refine Results
  1. 681

    Parametric Model for Coaxial Cavity Filter with Combined KCCA and MLSSVR by Shengbiao Wu, Huaning Li, Xianpeng Chen

    Published 2023-01-01
    “…First, the low-dimensional tuning data is mapped to the high-dimensional feature space by kernel canonical correlation analysis, and the nonlinear feature vectors are fused by the kernel function; second, the multioutput least squares support vector regression algorithm is used for parametric modeling to solve the problems of low accuracy and poor prediction performance; third, the support vector of the parameter model is optimized by the differential evolution whale algorithm (DWA) to improve the convergence and generalization ability of the model in actual tuning. …”
    Get full text
    Article
  2. 682

    Generating Dark Matter Subhalo Populations Using Normalizing Flows by Jack Lonergan, Andrew Benson, Daniel Gilman

    Published 2025-07-01
    “…We present a comparative analysis of strong gravitational lensing signatures generated by dark matter subhalo populations using two different approaches. The first approach models subhalos using an empirical model, while the second employs the Galacticus semi-analytic model of subhalo evolution. …”
    Get full text
    Article
  3. 683

    Multiobjective Optimization Design of a Fractional Order PID Controller for a Gun Control System by Qiang Gao, Jilin Chen, Li Wang, Shiqing Xu, Yuanlong Hou

    Published 2013-01-01
    “…To enhance the robustness of the algorithm for different problems, an adapting scheme of the mutation operation is further employed. …”
    Get full text
    Article
  4. 684

    Phase Space Similarity as a Signature for Rolling Bearing Fault Diagnosis and Remaining Useful Life Estimation by Fang Liu, Bing He, Yongbin Liu, Siliang Lu, Yilei Zhao, Jiwen Zhao

    Published 2016-01-01
    “…Secondly, the normalized cross-correlation (NCC) is employed to calculate the PSS between bearing data with different states. Based on the PSS, a fault pattern recognition algorithm, a bearing fault size prediction algorithm, and a RUL estimation algorithm are introduced to analyze the experimental signal. …”
    Get full text
    Article
  5. 685

    Postoperative outcome analysis of chronic rhinosinusitis using transfer learning with pre-trained foundation models based on endoscopic images: a multicenter, observational study by Wentao Gong, Keguang Chen, Xiao Chen, Xueli Liu, Zhen Li, Li Wang, Yuxuan Shi, Quan Liu, Xicai Sun, Xinsheng Huang, Xu Luo, Hongmeng Yu

    Published 2025-07-01
    “…Conclusion The transfer learning algorithm model based on pre-trained foundation models can provide accurate and reproducible analysis of postoperative outcomes in CRS, effectively addressing the issue of high subjectivity in postoperative evaluation. …”
    Get full text
    Article
  6. 686

    Shadow hamiltonian simulation by Rolando D. Somma, Robbie King, Robin Kothari, Thomas E. O’Brien, Ryan Babbush

    Published 2025-03-01
    “…Applications of this approach to quantum simulation problems include simulating the dynamics of exponentially large systems of free fermions or free bosons, the latter example recovering a recent algorithm for simulating exponentially many classical harmonic oscillators. …”
    Get full text
    Article
  7. 687

    Task offloading and resource allocation in vehicle heterogeneous networks with MEC by Haibo ZHANG, Qiuji LUAN, Jiang ZHU, Fangwei LI

    Published 2018-09-01
    “…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
    Get full text
    Article
  8. 688

    Service Composition and Optimal Selection for Industrial Software Integration with QoS and Availability by Yangzhen Cao, Shanhui Liu, Chaoyang Li, Hongen Yang, Yuanyang Wang

    Published 2025-07-01
    “…To efficiently solve the proposed model, a hybrid enhanced multi-objective Gray Wolf Optimizer (HEMOGWO) was developed. This algorithm integrated Tent chaotic mapping and a Levy flight-enhanced differential evolution (DE) strategy. …”
    Get full text
    Article
  9. 689

    Rolling Bearing Fault Diagnosis Method Based on Improved Variational Mode Decomposition and Information Entropy by Wen FAN, Lian GE, Xiaoting XIAO, Fangji GAN, Xin LAI, Hongxia DENG, Qi HUANG

    Published 2022-02-01
    “…A new fitness function combining differential evolution (DE) algorithm with gray wolf optimization (GWO) algorithm is proposed to form a new hybrid optimization algorithm, named DEGWO. …”
    Get full text
    Article
  10. 690

    Optimizing Ontology Alignment through Improved NSGA-II by Yikun Huang, Xingsi Xue, Chao Jiang

    Published 2020-01-01
    “…In this study, for further enhancing the performance of NSGA-II, we propose to incorporate into NSGA-II’s evolutionary process the monkey king evolution algorithm (MKE) as the local search algorithm. …”
    Get full text
    Article
  11. 691

    Research on concrete structure damage detection based on piezoelectric sensing technology and morphological fractal method by Hanqing Zhong, Liwei Shuai, Dongmin Deng

    Published 2025-07-01
    “…The research results show that the signal corrosion algorithm based on mathematical morphology can significantly enhance the contrast of the steepness characteristics of wave peaks at different damage stages, thereby more effectively capturing the self-similarity characteristics of signal waveforms. …”
    Get full text
    Article
  12. 692

    Numerical Simulation Study on the Strengthening Mechanism of Rock Materials under Impact Loads by Xin Liu, Kai Wang, Chunan Tang, Xikun Qian

    Published 2022-01-01
    “…The orthogonal design and range method are used to analyze the sensitivity of the dynamic damage constitutive parameters, and a differential evolution algorithm is used to invert the relevant parameters of the constitutive model. …”
    Get full text
    Article
  13. 693

    Modelling maintenance scheduling strategies for highway networks. by Bao Tong, Jianwei Wang, Xue Wang, Feihao Zhou, Xinhua Mao, Yaxin Duan

    Published 2022-01-01
    “…A simulated annealing algorithm and augmented Lagrange algorithm are employed to solve the two proposed models, respectively. …”
    Get full text
    Article
  14. 694

    Multi-Criteria Analysis of Steel–Concrete–Steel Slab Performance: Dynamic Response Assessment Under Post-Fire Explosion by Shijie Zhang, Zhenfu Chen, Yizhi Liu, Qiuwang Tao, Dan Wu, Pinyu Zou

    Published 2025-04-01
    “…This article uses ABAQUS 2020 finite element software and combines the different advantages of the implicit heat transfer algorithm and explosion display algorithm to establish a numerical simulation method for dynamic analysis of SCS slab under explosion after fire. …”
    Get full text
    Article
  15. 695

    Multi-Objective Optimization of Three-Stage Turbomachine Rotor Based on Complex Transfer Matrix Method by Hüseyin Tarık Niş, Ahmet Yıldız

    Published 2024-11-01
    “…Furthermore, it is noted that among the different optimization algorithms, ABC provided the best results for this multi-objective optimization problem.…”
    Get full text
    Article
  16. 696

    Time-Delay following Model for Connected and Automated Vehicles with Collision Conflicts and Forced Deceleration by Wenbo Wang, Fei Hui, Kaiwang Zhang, Xiangmo Zhao, Asad J. Khattak

    Published 2024-01-01
    “…Additionally, the model parameters are calibrated using real vehicle data from urban roads combined with an improved salp swarm algorithm. Finally, the evolution rule of disturbance in the traffic flow under different states is analyzed using a time-space diagram, and the DIDM-CSCL model is compared with the classical IDM. …”
    Get full text
    Article
  17. 697

    Modeling of the Power Station Boiler Combustion Efficiency Considering Multiple Work Condition with Feature Selection by TANG Zhenhao, WU Xiaoyan, CAO Shengxian

    Published 2020-04-01
    “…It is difficult for power station boiler efficiency to measure precisely A datadriven modeling method is proposed to establish the boiler combustion efficiency model, according to the machine learning theories A classification and regression trees (CART) algorithm provides correlated variables which have significant relation with the boiler combustion efficiency by data analysis Then, a KNearest Neighbor (KNN) classifies the samples to distinguish the data from different work conditions Based on the classified data, a least square support vector machine (LSSVM) optimized by differential evolution (DE) algorithm is proposed to establish a datadriven model (DDMMF) The parameters of LSSVM are optimized dynamically by DE to improve the model accuracy Finally, the prediction model is corrected dynamically for further improvement of the prediction accuracy The experimental results based on actual production data illustrate that the proposed approach can predict the boiler combustion efficiency accurately, which meets the requirements of boiler control and optimization…”
    Get full text
    Article
  18. 698

    Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study by Charles Momin, François-Xavier Standaert, Corentin Verhamme

    Published 2025-06-01
    “… Implementation-level countermeasures like masking can be applied to any cryptographic algorithm in order to mitigate Differential Power Analysis (DPA). …”
    Get full text
    Article
  19. 699

    Implementation of MS Circle Map in Digital Image Encryption by Ichsani Mursidah, Suryadi MT, Sarifuddin Madenda, Suryadi Harmanto

    Published 2025-06-01
    “…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
    Get full text
    Article
  20. 700

    Host-symbiont-gene phylogenetic reconciliation by Menet, Hugo, Trung, Alexia Nguyen, Daubin, Vincent, Tannier, Eric

    Published 2023-05-01
    “…These interactions range from independence or conflict to cooperation and coevolution, which results in them having a common history. The evolution of such systems is approached by phylogenetic reconciliation, which describes the common patterns of diversification between two different levels, e.g. genes and species, or hosts and symbionts for example. …”
    Get full text
    Article