-
1381
Impact of surrogate model accuracy on performance and model management strategy in surrogate-assisted evolutionary algorithms
Published 2025-09-01“…Surrogate-assisted evolutionary algorithms (SAEAs) are widely used to solve expensive optimization problems where evaluating candidate solutions is computationally intensive. …”
Get full text
Article -
1382
Grey Wolf Optimization- and Particle Swarm Optimization-Based PD/I Controllers and DC/DC Buck Converters Designed for PEM Fuel Cell-Powered Quadrotor
Published 2025-04-01“…On the other hand, it was determined that the tracking errors in the performance of the desired and actual values of both translational and rotational movement parameters and the forces and torques required for the quadrotor to follow this route were obtained at a maximum of 4% for systems optimized with both techniques. This shows that the full systems optimized with both GWO and PSO algorithms significantly increase their energy efficiency and provide maximum route-following performance.…”
Get full text
Article -
1383
Multi-Objective Optimization for Green BTS Site Selection in Telecommunication Networks Using NSGA-II and MOPSO
Published 2025-01-01“…These algorithms were chosen due to their proven efficiency in handling NP-hard optimization problems and their ability to balance exploration and exploitation in search spaces.…”
Get full text
Article -
1384
A Heuristic Optical Flow Scheduling Algorithm for Low-Delay Vehicular Visible Light Communication
Published 2025-07-01“…The cost of this algorithm is very low, and it is suitable for deployment on edge computing platforms such as vehicles.…”
Get full text
Article -
1385
Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults
Published 2022-01-01“…In order to improve the construction method of highway tunnel fault, improve the excavation level, improve the construction efficiency, reduce the project cost, and shorten the construction period, so as to find a specific road, this paper puts forward the research method of tunnel stability analysis and construction parameter optimization in the fault fracture zone. …”
Get full text
Article -
1386
Comprehensive Comparison and Validation of Forest Disturbance Monitoring Algorithms Based on Landsat Time Series in China
Published 2025-02-01“…When considering different forest disturbance types, COLD achieved the highest accuracies for Fire, Harvest, and Other disturbances, while CCDC was most accurate for Forestation. These findings highlight the necessity of region-specific calibration and parameter optimization tailored to specific disturbance types to improve forest disturbance monitoring accuracy, and also provide a solid foundation for future studies on algorithm modifications and ensembles.…”
Get full text
Article -
1387
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
1388
Marine Voyage Optimization and Weather Routing with Deep Reinforcement Learning
Published 2025-04-01“…These algorithms are computationally costly, so we split optimization into an offline phase (costly pre-training for a route) and an online phase where the algorithms are fine-tuned as updated weather data become available. …”
Get full text
Article -
1389
An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks
Published 2024-10-01“…Therefore, this paper proposes an energy-saving scheduling algorithm based on transformer networks, aimed at optimizing energy consumption and data transmission efficiency of wireless monitoring sensors in oil and gas pipelines. …”
Get full text
Article -
1390
Improving the System of Mandatory Requirements to Business under the Digital Transformation of Economy
Published 2023-08-01“…Objective: to elaborate scientifically substantiated proposals for improving the system of mandatory requirements in the sphere of business and other economic activity under formation of digital economy, taking into account the foreign experience of eliminating barriers for business and the available practice of legislation optimization in this sphere.Methods: the research methodological basis consists of traditional general and specific methods of scientific cognition: dialectical, formal-logical, historical-comparative, systematic, terminological, general logic methods (analysis, synthesis, generalization, induction, deduction, etc.), as well as special methods: historical-legal, formal-legal, and method of comparative jurisprudence.Results: the author investigated and systematized theoretical approaches and experience of improving the system of mandatory requirements in foreign countries and the Russian Federation; the possibilities of introducing the most successful innovative legal instruments and practices to improve the regulation of economic relations were considered. …”
Get full text
Article -
1391
A Review of Smart Camera Sensor Placement in Construction
Published 2024-12-01“…This comprehensive review navigates through the complexities of camera and environment models, advocating for advanced optimization techniques like genetic algorithms, greedy algorithms, Swarm Intelligence, and Markov Chain Monte Carlo to refine CSP strategies. …”
Get full text
Article -
1392
An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement
Published 2022-06-01“…Simulations have been performed on some datasets from the UCI repository to evaluate MCEMS scheme compared to state-of-the-art algorithms. Extensive experiments clearly prove the superiority of MCEMS over HMM, DSPA and WHAC algorithms based on Wilcoxon test and Cophenetic correlation coefficient.…”
Get full text
Article -
1393
Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning
Published 2025-05-01“…Therefore, this study aims to evaluate the effectiveness of machine learning methods for meteorological drought estimation and to integrate Random Oversampling (ROS) and Genetic Algorithm (GA) methods to improve estimation accuracy. …”
Get full text
Article -
1394
A Two-Stage Bin Packing Algorithm for Minimizing Machines and Operators in Cyclic Production Systems
Published 2025-06-01“…The results of our algorithm led to significant cost savings and improved scheduling performance. …”
Get full text
Article -
1395
Non-Vertical Well Trajectory Design Based on Multi-Objective Optimization
Published 2025-07-01“…The optimization and control of the wellbore trajectory is one of the important technologies to improve drilling efficiency, reduce drilling cost, and ensure drilling safety in the process of modern oil and gas exploration and development. …”
Get full text
Article -
1396
The Application of the SubChain Salp Swarm Algorithm in the Less-Than-Truckload Freight Matching Problem
Published 2025-04-01“…Traditional LTL matching methods are challenged by delays in updating logistic information and higher distribution costs. In order to solve LTL challenges, we developed a novel SubChain Salp Swarm Algorithm (SSSA) by improving the traditional Salp Swarm Algorithm with the utilization of a SubChain operation. …”
Get full text
Article -
1397
Critical Component Overheating Monitoring Algorithm Integrating Temperature-sensing Patches and Computer Vision Trains
Published 2025-03-01“…In the test on a real dataset, the improved algorithm achieves an accuracy rate of 99.30%.…”
Get full text
Article -
1398
Social Network Analysis: A Novel Paradigm for Improving Community Detection
Published 2025-04-01“…One of the most considered philosophies when defining this type of technique is the use of the graph’s adjacency matrix as input and the consideration of modularity as the function to be optimized. …”
Get full text
Article -
1399
Improvement of RT-DETR model for ground glass pulmonary nodule detection.
Published 2025-01-01“…This article proposed an algorithm based on RT-DETR model with the following enhancement: 1) optimize the backbone network with FCGE blocks to increase the detection accuracy of small-sized and blurred edge nodules; 2) replace the AIFI module with HiLo-AIFI module to reduce redundant computation and improve the detection accuracy of pure ground glass pulmonary nodules and mixed ground glass pulmonary nodules; 3) replace the DGAK module with CCFF module to address the issue of capturing complex features and recognition of irregularly shaped ground glass nodules. …”
Get full text
Article -
1400
Development and Comparison of Interrupt-Based and Analog-to-Digital Converter Algorithms for Seed Counting in Precision Planters
Published 2024-12-01“…Both developed circuits featured the deployment of the STM32F103C8T6 microcontroller, renowned for its robust capabilities and cost efficiency.In the interrupt-based algorithm's development, the microcontroller's external interrupt was used, selecting its sensitivity to detect both rising and falling edges. …”
Get full text
Article